Updated on 2022/11/26

写真a

 
KODERA Yuuta
 
Organization
Faculty of Natural Science and Technology Assistant Professor
Position
Assistant Professor
External link

Degree

  • Ph. D. in Engineering ( 2020.3   Okayama University )

  • Ph. D. ( 2020.3   Okayama University )

  • Master (Engineering) ( 2018.3   Okayama University )

  • Master of Engineering ( 2018.3   Okayama University )

  • Bachelor (Engineering) ( 2017.3   Okayama University )

  • Bachelor of Engineering ( 2017.3   Okayama University )

▼display all

Research Areas

  • Informatics / Information security

Education

  • Okayama University   大学院自然科学研究科博士後期課程  

    2018.4 - 2020.3

      More details

    Country: Japan

    researchmap

  • Okayama University   大学院自然科学研究科博士前期課程  

    2017.4 - 2018.3

      More details

    Country: Japan

    researchmap

  • Okayama University   工学部  

    2013.4 - 2017.3

      More details

    Country: Japan

    researchmap

Research History

  • Okayama University   Faculty of Natural Science and Technology   Assistant Professor

    2022.4

      More details

    Country:Japan

    researchmap

  • Okayama University   Green Innovation Center   Assistant Professor (concurrently)

    2022.4

      More details

    Country:Japan

    researchmap

  • Okayama Prefectural University

    2021.4

      More details

  • Okayama University   The Graduate School of Natural Science and Technology   Project Assistant Professor

    2020.4 - 2022.3

      More details

    Notes:岡山大学数理・データサイエンス教育タスクフォース

    researchmap

  • International Pacific University

    2020.4 - 2022.3

      More details

  • JSPS Research Fellowship for Young Scientists

    2019.4 - 2020.3

      More details

    Country:Japan

    researchmap

▼display all

Professional Memberships

 

Papers

  • A Method to Eliminate Fruitless Cycles for Pollard’s Rho Method by Splitting a Seed-point Table for a Random Walk Reviewed

    Shota Kanzawa, Hiromasa Miura, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka

    Tenth International Symposium on Computing and Networking   110 - 116   2022.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates Reviewed

    Tomohiro Iida, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Tenth International Symposium on Computing and Networking Workshops   309 - 315   2022.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation Reviewed

    Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Tenth International Symposium on Computing and Networking   104 - 109   2022.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Design and implementation of a practical control system for an air-conditioner with IoT sensor nodes Reviewed

    Mengfang Duan, Yuta Kodera, Nobuya Ishihara, Yasuyuki Nogami, Takuya Kusaka

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications   2022.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Effectiveness of a Method to Eliminate Fruitless Cycles for Pollard's Rho Method Reviewed

    S. Kanzawa, H. Miura, Y. Kodera, Y. Nogami, T. Kusaka

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications   2022.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Comparison of Conversion Matrices for a Compact AES-CTR Defined over an Isomorphic Field Reviewed

    Tomoya Hikida, Yasuyuki Nogami, Md. Arshad Ali, Yuta. Kodera

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications   2022.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Consideration on Change the Transition Probability of SHAKE256 with Different Initial Values Reviewed

    T. Ishida, R. Sato, Md. Arshad Ali, T. Kusaka, Y. Nogami, Y. Kodera

    The 37th International Technical Conference on Circuits/Systems, Computers and Communications   2022.7

     More details

    Authorship:Last author, Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain Reviewed

    Hiroaki Nasu, Yuta Kodera, Yasuyuki Nogami

    Sensors   22 ( 13 )   4909 - 4909   2022.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:MDPI AG  

    Ensuring the reliability of data gathering from every connected device is an essential issue for promoting the advancement of the next paradigm shift, i.e., Industry 4.0. Blockchain technology is becoming recognized as an advanced tool. However, data collaboration using blockchain has not progressed sufficiently among companies in the industrial supply chain (SC) that handle sensitive data, such as those related to product quality, etc. There are two reasons why data utilization is not sufficiently advanced in the industrial SC. The first is that manufacturing information is top secret. Blockchain mechanisms, such as Bitcoin, which uses PKI, require plaintext to be shared between companies to verify the identity of the company that sent the data. Another is that the merits of data collaboration between companies have not been materialized. To solve these problems, this paper proposes a business-to-business collaboration system using homomorphic encryption and blockchain techniques. Using the proposed system, each company can exchange encrypted confidential information and utilize the data for its own business. In a trial, an equipment manufacturer was able to identify the quality change caused by a decrease in equipment performance as a cryptographic value from blockchain and to identify the change one month earlier without knowing the quality value.

    DOI: 10.3390/s22134909

    researchmap

  • Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs Reviewed

    Y. Kodera, R. Sato, A. M. Ali, T. Kusaka, Takuya Y. Nogami

    Entropy   24 ( 6 )   780 - 780   2022.5

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/e24060780

    researchmap

  • Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs Reviewed

    Yuta Kodera, Ryoichi Sato, Md. Arshad Ali, Takuya Kusaka, Yasuyuki Nogami

    Entropy   24 ( 6 )   1 - 13   2022.5

     More details

    Authorship:Lead author, Corresponding author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/e24060780

    researchmap

  • A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain Reviewed

    H. Nasu, R. Miyamoto, Y. Kodera, Y. Nogami

    World Academy of Science, Engineering and Technology, Open Science Index 183, International Journal of Information and Communication Engineering   16 ( 3 )   77 - 81   2022.3

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Consideration of the side-channel attack to SIMON implemented on Arduino Uno. Reviewed

    Harunobu Enami, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking   412 - 415   2021.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDARW53999.2021.00075

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021w.html#EnamiKKN21

  • Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS. Reviewed

    Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking(CANDAR)   48 - 55   2021.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDAR53791.2021.00014

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021.html#NanjoSKKN21

  • Consideration of the side-channel attack to SPECK implemented on Arduino Uno. Reviewed

    Masaki Nakanose, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking   339 - 345   2021.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDARW53999.2021.00064

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021w.html#NakanoseKKN21

  • Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators. Reviewed

    Ryoichi Sato, Yuta Kodera, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Robert H. Morelos-Zaragoza

    Entropy   23 ( 9:1168 )   1 - 10   2021.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3390/e23091168

    researchmap

  • A Proposal for Testing Physical Random Numbers Using Stochastic Process Reviewed

    Ryoichi Sato, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603232

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#SatoKKN21

  • A Property Management System Using Image Recognition by YOLO Reviewed

    Taiki Miyamoto, Ryo Fukushima, Kazuaki Harada, Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603146

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#MiyamotoFHYKKN21

  • Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain Reviewed

    Hiroaki Nasu, Yuta Kodera, Yasuyuki. Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603017

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#NasuKN21

  • Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis Reviewed

    Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2021 IEEE International Conference on Consumer Electronics – Taiwan   1 - 2   2021.9

     More details

    Authorship:Corresponding author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/ICCE-TW52618.2021.9603240

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/icce-tw/icce-tw2021.html#YoshimotoKKN21

  • Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve Reviewed

    Miura Hiromasa, Kanzawa Syota, Matsumura Rikuya, Kodera Yuta, Kusaka Takuya, Nogami Yasuyuki

    International Journal of Networking and Computing   11 ( 2 )   231 - 250   2021.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:IJNC Editorial Committee  

    In this paper, the authors focus on and propose an approach to attack a kind of pairing-friendly curves, the Barreto-Naehring (BN) curve, to accelerate the evaluation of the security level concerning the elliptic curve discrete logarithm problem (ECDLP). More precisely, this paper targets the BN curve, which is known to be a pairing-friendly curve, and Pollard's rho method based on the random-walk is adopted to attack the curve.Though Pollard's rho method with skew Frobenius mapping is known to solve the ECDLP efficiently, this approach sometimes induces the unsolvable cycle, called the fruitless cycle, and such trials must restart with a different starting point. However, any effective method to eliminate such fruitless cycles has not been proposed. Therefore, the authors focus and give the sophisticated analysis to propose an effective approach to eliminate such cycles to optimize Pollard's rho method furthermore. In addition, we confirm the effectiveness of the method by applying it to a BN curve with 12, 17, and 33-bit parameters.

    DOI: 10.15803/ijnc.11.2_231

    CiNii Article

    researchmap

  • Efficient Implementation of ECDH for Sigfox Communication Reviewed

    Ryo Fukushima, Daichi Hattori, Wataru Takehisa, Ryoichi Sato, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   116 - 119   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Calculation Costs Estimations of Final Exponentiation for Pairing-Friendly Elliptic Curves Resistant to Special TNFS Reviewed

    Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yusyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   229 - 232   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Proposal of Piccolo-CMAC for Sigfox network Reviewed

    Wataru Takehisa, Ryo Fukushima, Ryoichi Sato, Daichi Hattori, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   120 - 123   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Discussion of Statistical Affect of Rotation and XOR on Non-linear Filters for Sequences Reviewed

    Tugumi Takatani, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 36th International Technical Conference on Circuits/Systems, Computers and Communications   316 - 319   2021.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees. Reviewed

    Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Ninth International Symposium on Computing and Networking(CANDAR)   148 - 154   2021

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/CANDAR53791.2021.00028

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/ic-nc/candar2021.html#NanjoSKKN21a

  • Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator Reviewed

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Silicon Valley Cybersecurity Conference 2020   CCIS 1383   38 - 48   2020.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-030-72725-3_3

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/svcc/svcc2020.html#TaketaKKN20

  • Multiplication and squaring in cubic and quartic extensions for pairing based cryptography Reviewed

    Yuta Kodera, Sylvain Duquesne, Yasuyuki Nogami

    Finite Fields and their Applications   71 - 86   2020.10

     More details

    Authorship:Lead author   Language:English   Publishing type:Part of collection (book)   Publisher:De Gruyter  

    DOI: 10.1515/9783110621730-006

    researchmap

    Other Link: https://www.degruyter.com/document/doi/10.1515/9783110621730-006/xml

  • A Parallel Blum-Micali Generator Based on the Gauss Periods Reviewed

    Yuta Kodera, Tomoya Tatara, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara

    The International Symposium on Information Theory and Its Applications 2020   447 - 450   2020.10

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    DOI: 10.34385/proc.65.C04-1

    CiNii Article

    researchmap

  • Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol Reviewed

    Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara

    Advances in Information and Computer Security   LNCS 12231   23 - 36   2020.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-58208-1_2

    researchmap

  • Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist. Reviewed

    Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    International Journal of Networking and Computing   10 ( 2 )   144 - 158   2020.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

    Other Link: https://dblp.uni-trier.de/db/journals/ijnc/ijnc10.html#YoshimotoUKKN20

  • Electrical Falsification of CAN Data by Magnetic Coupling Reviewed

    Hiroto Ogura, Ryunosuke Isshiki, Kengo Iokibe, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 35th International Technical Conference on Circuits/Systems, Computers and Communications   348 - 353   2020.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Controller Area Network (CAN) is widely employed as an in-vehicle network, and is required for extremely high reliability. CAN uses five mechanisms to detect errors caused by channel noises in CAN frames. However, an adversary can reportedly falsify a CAN frame by tampering with sample points in the frame. In this paper, the effectiveness of a new falsification method that does not require sample point tampering is proposed. In the method, transient electromagnetic pulses are injected into a CAN bus by magnetic coupling that enables falsification at the target CAN node without error detection. The proposed method was examined on a CAN bus which consists of two CAN nodes. As a result, the new falsification method was effective for CAN.

    Web of Science

    researchmap

  • Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s) Reviewed

    Yuta Kodera, Md. Arshad Ali, Takeru Miyazaki, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E102-A ( 12 )   1659 - 1667   2019.12

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    <p>An algebraic group is an essential mathematical structure for current communication systems and information security technologies. Further, as a widely used technology underlying such systems, pseudorandom number generators have become an indispensable part of their construction. This paper focuses on a theoretical analysis for a series of pseudorandom sequences generated by a trace function and the Legendre symbol over an odd characteristic field. As a consequence, the authors give a theoretical proof that ensures a set of subsequences forms a group with a specific binary operation.</p>

    DOI: 10.1587/transfun.e102.a.1659

    CiNii Article

    researchmap

  • Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library Reviewed

    Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2019 Seventh International Symposium on Computing and Networking (CANDAR)   245 - 250   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2019.00040

    researchmap

  • Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence Reviewed

    Yuki Taketa, Yuta Kodera, Shogo Tanida, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi, Satoshi Uehara

    The Seventh International Symposium on Computing and Networking Workshops   394 - 400   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Machine learning (ML) technology has been getting popular in many applications where ML purposes to analyze or classify data, or predicting the phenomenon follows from the previous conditions, for example. However, the spread of ML technologies allows an attacker to use them into the attack for the sake of sniffing secret information. Since the randomness has been used for an inseparable part of the cryptographic applications to ensure the security, the resistance of a random sequence against analysis based on the ML technologies have to be required. The authors anticipate having the mutual relationship between the classical properties of the randomness, linear complexity (LC) in particular, and the structure of a neural network (NN), which is a class of ML. In this research, the authors find that the strength of each connection between nodes in the NN is relevant to the linear recurrence relation of the target sequence by observing parameters after complete learning. In other words, the difficulty of predicting the next bits from a given sequence would be discussed based on the LC of a sequence in most cases. The experimental results are introduced to clarify the black box in this research.

    DOI: 10.1109/candarw.2019.00074

    Web of Science

    researchmap

  • Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box Reviewed

    Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami

    The Seventh International Symposium on Computing and Networking   157 - 163   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2019.00027

    researchmap

  • A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller Reviewed

    Yoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami

    The Seventh International Symposium on Computing and Networking   225 - 231   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    Among the increasing evolution of IoT devices, practical applications need reliable secure protocols to communicate with each other. A major issue for modern cryptosystems is an implementation of secure and trustworthy mechanisms to rely on. A side-channel attack against these cryptosystems may overturn the guarantee of security against conventional cyber-attacks. Elliptic curve cryptography is public-key cryptography based on elliptic curves, and one of the well-known curves is Curve25519 which is used for TLS protocols as a recommended curve. This curve is mainly implemented on limited resource devices such as microcontrollers. However, this curve poses a weakness for low-order points during a Diffie-Hellman key exchange is employed. This research demonstrates possible exploitation of a threat of order 8 rational points of Curve25519 and shows results of the side-channel attacks using order 8 rational points on an embedded system. The results indicate the order 8 rational points might be applied to key extraction as attacker sides.

    DOI: 10.1109/candar.2019.00037

    Web of Science

    researchmap

  • An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code Reviewed

    Shinichi Kageyama, Ken Ikuta, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The Seventh International Symposium on Computing and Networking Workshops   425 - 429   2019.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candarw.2019.00080

    researchmap

  • Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    International Journal of Networking and Computing   9 ( 2 )   171 - 187   2019.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:IJNC Editorial Committee  

    DOI: 10.15803/ijnc.9.2_171

    researchmap

  • A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    Information Security Applications   LNCS 11402   241 - 252   2019.8

     More details

    Authorship:Lead author   Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-17982-3_19

    researchmap

  • Multi-Value Sequence Generated over Sub Extension Field and Its Properties Reviewed

    Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Satoshi Uehara, Yasuyuki Nogami, Robert H. Morelos-Zaragoza

    Journal of Information Security   10 ( 03 )   130 - 154   2019.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Scientific Research Publishing, Inc.  

    DOI: 10.4236/jis.2019.103008

    researchmap

  • Well Balanced Multi-value Sequence and its Properties Over Odd Characteristic Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Md. Fazle Rabbi, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    Advances in Science, Technology and Engineering Systems Journal   4 ( 4 )   188 - 196   2019.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ASTES Journal  

    The authors propose a well balanced multi-value sequence (including a binary sequence). All the sequence coefficients (except the zero) appear almost the same in number, thus, the proposed sequence is so called the well balanced sequence. This paper experimentally describes some prominent features regarding a sequence, for instance, its period, autocorrelation, and cross-correlation. The value of the autocorrelation and cross-correlation can be explicitly given by the authors formulated theorems. In addition, to ensure the usability of the proposed multi-value sequence, the authors introduce its flexibility by making it a binary sequence. Furthermore, this paper also introduces a comparison in terms of the linear complexity and distribution of bit patterns properties with their previous works. According to the comparison results, the proposed sequence holds better properties compared to our previous sequence.

    DOI: 10.25046/aj040423

    Scopus

    researchmap

  • A Comparison of Relic-toolkit and ELiPS Libraries for a Pairing-based Homomorphic Encryption Reviewed

    Tadaki Kanenari, Yuto Takahashi, Yuta Hashimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Toru Nakanishi

    The 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   158 - 161   2019.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/itc-cscc.2019.8793446

    researchmap

  • Updating A Secret Key for MAC Implemented on CAN Using Broadcast Encryption Scheme Reviewed

    Tomoya Tatara, Hiroto Ogura, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    The 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   166 - 169   2019.6

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/itc-cscc.2019.8793298

    researchmap

  • NIST Statistical Test for Random Sequence Generated by Möbius Function Reviewed

    Fatema Akhter, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka

    2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2019.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-tw46550.2019.8992033

    researchmap

  • A Consideration on Generating Uniform Binary Sequence with High Linear Complexity Reviewed

    Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2019 IEEE International Conference on Consumer Electronics - Taiwan   2019.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-tw46550.2019.8991711

    researchmap

  • Boundary for the Linear Complexity of Well Balanced NTU Reviewed

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)   2019.5

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-tw46550.2019.8992029

    researchmap

  • Distribution of Bit Patterns in Binary Sequence Generated Over Sub Extension Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    Advances in Science, Technology and Engineering Systems Journal   4 ( 2 )   370 - 379   2019.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:ASTES Journal  

    The distribution of bit patterns is an important measure to check the randomness of a sequence. The authors of this paper observed this crucial property in a binary sequence which generated by using a primitive polynomial, trace function, and Legendre symbol defined over the sub extension field. The authors create a new dimension in the sequence generation research area by considering the sub extension field, whereas all our previous works are focused in the prime field. In terms of distribution of bit patterns property, this research work has notable outcomes more specifically the binary sequence (defined over the sub extension field) holds much better (close to uniform) bit distribution than the previous binary sequence (defined over the prime field). Furthermore, the authors theoretically proved the distribution of bit property in this paper.

    DOI: 10.25046/aj040246

    Scopus

    researchmap

  • Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza

    The 6th International Conference on Information Technology: IoT and Smart City   92 - 96   2018.12

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM Press  

    The authors of this paper have observed the distribution of bit patterns property of a binary sequence which is generated by using a primitive polynomial, trace function, and Legendre symbol over the sub extension field. However, one of the most important measure for evaluating the randomness of a sequence which is so called the distribution of bit patterns still has not been investigated. This paper focused on the distribution of bit patterns based on some experimental results. After observing many experimental results, the authors found that the number of appearance of each bit pattern is related to the number of zeros contained in each bit pattern. Furthermore, the authors formulated an equation to explain the distribution of bit patterns in a binary sequence.

    DOI: 10.1145/3301551.3301562

    Scopus

    researchmap

  • Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage Reviewed

    Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami

    The Sixth International Symposium on Computing and Networking Workshops (CANDARW)   292 - 297   2018.11

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    The recent development of IoT technologies and cloud storages, many types of information including private information have been gradually outsourced. For such a situation, new convenient functionalities such as arithmetic and keyword search on ciphertexts are required to allow users to retrieve information without leaking any information. Especially, searchable encryptions have been paid much attention to realize a keyword search on an encrypted domain. In addition, an architecture of searchable symmetric encryption (SSE) is a suitable and efficient solution for data outsourcing.In this paper, we focus on an SSE scheme which employs a secure index for searching a keyword with optimal search time. In the conventional studies, it has been widely considered that the scheme searches whether a queried keyword is contained in encrypted documents. On the other hand, we additionally take into account the location of a queried keyword in documents by targeting a matrix-type data format. It enables a manager to search personal information listed per line or column in CSV-like format data.

    DOI: 10.1109/candarw.2018.00061

    Web of Science

    researchmap

  • Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field Reviewed

    Yuta Kodera, Takeru Miyazaki, Md. Al-Amin Khandaker, Md. Arshad Ali, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E101-A ( 9 )   1525 - 1536   2018.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.e101.a.1525

    Web of Science

    researchmap

  • An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno. Reviewed

    Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami

    International Journal of Networking and Computing   8 ( 2 )   341 - 350   2018.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    researchmap

  • Linear Complexity of Pseudo-random Binary Sequence Generated Over Proper Sub Extension Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza

    The 33th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC)   448 - 451   2018.7

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Relation between the Irreducible Polynomials that Generates the Same Binary Sequence Over Odd Characteristic Field Reviewed

    Md. Arshad Ali, Yuta Kodera, Taehwan Park, Takuya Kusaka, Yasuyuki Nogmi, Howon Kim

    Journal of information and communication convergence engineering   16 ( 3 )   166 - 172   2018.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    A pseudo-random sequence generated by using a primitive polynomial, trace function, and Legendre symbol has been researched in our previous work. Our previous sequence has some interesting features such as period, autocorrelation, and linear complexity. A pseudo-random sequence widely used in cryptography. However, from the aspect of the practical use in cryptographic systems sequence needs to generate swiftly. Our previous sequence generated by utilizing a primitive polynomial, however, finding a primitive polynomial requires high calculating cost when the degree or the characteristic is large. It's a shortcoming of our previous work. The main contribution of this work is to find some relation between the generated sequence and irreducible polynomials. The purpose of this relationship is to generate the same sequence without utilizing a primitive polynomial. From the experimental observation, it is found that there are (p - 1)/2 kinds of polynomial, which generates the same sequence. In addition, some of these polynomials are non-primitive polynomial. In this paper, these relationships between the sequence and the polynomials are shown by some examples. Furthermore, these relationships are proven theoretically also.

    DOI: 10.6109/jicce.2018.16.3.166

    Scopus

    researchmap

  • Evaluating the Maximum Order Complexity of a Uniformly distributed Sequence over Odd Characteristic Reviewed

    Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Yasuyuki Nogamit, Satoshi Uehara, Robert H. Morelos-Zaragoza

    2018 IEEE International Conference on Consumer Electronics – Taiwan   2018.5

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • A Consideration of an Efficient Arithmetic over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography Reviewed

    Xin Li, Yuta Kodera, Yoshinori Uetake, Takuya Kusaka, Yasuyuki Nogami

    2018 IEEE International Conference on Consumer Electronics – Taiwan   2018.5

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    researchmap

  • Uniform Binary Sequence Generated over Odd Characteristic Field Reviewed

    Yuta Kodera, Takuya Kusaka, Ali Md. Arshad, Yasuyuki Nogami, Takeru Miyazak, Satoshi Uehara

    International Journal of Information and Electronics Engineering   8 ( 1 )   5 - 9   2018.3

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:EJournal Publishing  

    DOI: 10.18178/ijiee.2018.8.1.685

    researchmap

  • Efficient Optimal Ate Pairing at 128-Bit Security Level Reviewed

    Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera

    INDOCRYPT 2017   LNCS 10698   186 - 205   2017.12

     More details

    Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    Following the emergence of Kim and Barbulescu's new number field sieve (exTNFS) algorithm at CRYPTO'16 [21] for solving discrete logarithm problem (DLP) over the finite field; pairing-based cryptography researchers are intrigued to find new parameters that confirm standard security levels against exTNFS. Recently, Barbulescu and Duquesne have suggested new parameters [3] for well-studied pairing-friendly curves i.e., Barreto-Naehrig (BN) [5], Barreto-Lynn-Scott (BLS12) [4] and Kachisa-Schaefer-Scott (KSS-16) [19] curves at 128-bit security level (twist and sub-group attack secure). They have also concluded that in the context of Optimal-Ate pairing with their suggested parameters, BLS-12 and KSS-16 curves are more efficient choices than BN curves. Therefore, this paper selects the atypical and less studied pairingfriendly curve in literature, i.e., KSS-16 which offers quartic twist, while BN and BLS-12 curves have sextic twist. In this paper, the authors optimize Miller's algorithm of Optimal-Ate pairing for the KSS-16 curve by deriving efficient sparse multiplication and implement them. Furthermore, this paper concentrates on the Miller's algorithm to experimentally verify Barbulescu et al.'s estimation. The result shows that Miller's algorithm time with the derived pseudo 8-sparse multiplication is most efficient for KSS-16 than other two curves. Therefore, this paper defends Barbulescu and Duquesne's conclusion for 128-bit security.

    DOI: 10.1007/978-3-319-71667-1_10

    Web of Science

    researchmap

  • An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller Reviewed

    Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami

    The Fifth International Symposium on Computing and Networking   283 - 294   2017.11

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2017.90

    Scopus

    researchmap

  • An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence Reviewed

    Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara

    The Fifth International Symposium on Computing and Networking   451 - 455   2017.11

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/candar.2017.86

    Scopus

    researchmap

  • Distribution of bit patterns on multi-value sequence over odd characteristics field Reviewed

    Yuta Kodera, Takeru Miyazaki, Md. Al-Amin Khandaker, Ali Md. Arshad, Yasuyuki Nogami, Satoshi Uehara

    2017 IEEE International Conference on Consumer Electronics - Taiwan   2017.6

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:IEEE  

    DOI: 10.1109/icce-china.2017.7991033

    Scopus

    researchmap

  • Efficient Optimal Ate Pairing at 128-Bit Security Level.

    Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera

    Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India(INDOCRYPT)   186 - 205   2017

     More details

    Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-319-71667-1_10

    researchmap

    Other Link: https://dblp.uni-trier.de/db/conf/indocrypt/indocrypt2017.html#KhandakerNGDNK17

  • A Consideration of an Efficient Calculation over the Extension Field of Degree 3 and 4 for Elliptic Curve Pairing Cryptography Reviewed

    Akihiro Sanada, Yuta Kodera, Yasuyuki Nogami, Sylvain Duquesne, Masaaki Shirase

    The International Symposium on Information Theory and Its Applications 2016   2016.10

     More details

    Language:English   Publishing type:Research paper (other academic)  

    researchmap

▼display all

MISC

  • Implementation and evaluation of secure platform to CAN FD communication system using Raspberry Pi

    545 - 549   2022.11

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Proposal of Authentication Method for USB Device Using a One-Time Password

    453 - 458   2022.11

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration on Verifying Indistinguishability for Physical Random Numbers Using Markov Processes

    325 - 329   2022.11

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Evaluation of RO-type Random Number Generator Circuits by Markov Processes and Hypothesis Testing

    Ryoichi Sato, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera

    7 - 12   2022.9

     More details

    Authorship:Last author, Corresponding author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Consideration of an authentication using protocol CVMA parameters

    Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    2022.7

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    researchmap

  • Improvement of Algorithm for Computing Final Exponentiation for Pairing on FK12

    2022.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Fast Generating Rational Points on G2 for Pairing on BLS12

    2022.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Proposal of Countermeasures for Malicious USB Devices using OTP Authentication

    6 - 9   2021.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Proposal of Optimal Curve Parameters for Pairing Computation on BLS12 Curve and Its Evaluation of Implementation

    Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    IEICE Technical Report   120 ( 224(ISEC2020-32) )   1 - 6   2020.11

     More details

    Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

  • Thermal Image Human Thermometer and Its Privacy Protection with Raspberry Pi

    Yuan Yang, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of Computer Security Symposium   384 - 388   2020.10

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    CiNii Article

    researchmap

  • A Consideration for the Linear Complexity of Cascaded NTU Sequence

    Tomoya Tatara, Yuta Kodera, Yasuyuki Nogami

    Proceedings of the 6th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   12 - 17   2020.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • リングオシレータを用いた小規模な物理乱数生成回路の設計および乱数性評価

    Ryoichi Sato, Yuta Kodera, Yasuyuki Nogami

    Proceedings of the 6th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   32 - 35   2020.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Consideration of the Design of Nonlinear Filters for a Cryptographic Generator

    Tugumi Takatani, Yuta Kodera, Yasuyuki Nogami

    Proceedings of the 6th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   19 - 23   2020.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Evaluation of Pairing on Elliptic Curves with Embedding Degree 15 with Type-II All-one Polynomial Extension Field of Degree 5

    Yuki Nanjo, Yuta Kodera, Rikuya Matsumura, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of 2020 Symposium on Cryptography and Information Security   2020.1

     More details

    Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A New Method to Generate Binary Pseudorandom Number Sequences with the Group Structure by a Nonlinear Filter

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 5th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   1 - 6   2019.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Classifying a Random Number Generators Based on a Statistical Feature of the Distribution of Bits

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 5th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   33 - 40   2019.9

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration for the Indistinguishability of a Geometric Sequence

    Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 5th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   7 - 10   2019.9

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Comparison of Relic-toolkit and ELiPS Libraries for Some Pairing-based Homomorphic Encryption

    Tadaki Kanenari, Yuto Takahashi, Yuta Hashimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Toru Nakanishi

    Proceedings of 2019 Symposium on Cryptography and Information Security   2019.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration of the Parameter Selection for a Uniformized Binary Geometric Sequence Generated by Using the Legendre Symbol

    Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami, Robert H. Morelos-Zaragoza

    Proceedings of 2019 Symposium on Cryptography and Information Security   2019.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • 物理乱数生成器の偏り抑制の一方法

    渡邊翔, 小寺雄太, 籠谷裕人, 野上保之

    情報理論とその応用シンポジウム予稿集(CD-ROM)   42nd   2019

  • Evaluation of Partial Randomness of a Certain Pseudorandom Sequences with Flexible Linear Complexity

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 41th Symposium on Information Theory and its Applications   41st   315 - 320   2018.12

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • An Improvement of NTU Sequence Generation Using Sub Extension Field by CVMA

    Toshifumi Matsumoto, Yuta Kodera, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 41th Symposium on Information Theory and its Applications   41st   327 - 331   2018.12

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • A Consideration for an Efficient Implementation of a Pseudorandom Sequence Generated by Trace function and Legendre symbol and Its Randomness Properties

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 41th Symposium on Information Theory and Its Application   321 - 326   2018.12

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Autocorrelation of a Geometric Sequence Binarized over an Odd Characteristic Field

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of Computer Security Symposium 2018   420 - 424   2018.10

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Consideration for Utilizing a CSPRNG for a Searchable Symmetric Encryption

    Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 4th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   8 - 13   2018.8

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • A Pseudorandom Sequence Possessing a Flexibility on the Linear Complexity

    Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami

    Proceedings of the 4th Workshop on Finite Field Theory and its Application for Pseud-Random Sequence   14 - 18   2018.8

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Implementation method of the pairing over BN curve using two type of extension fields

    Yuki Nanjo, Md. Al-Amin Khandaker, Yuta Kodera, Yasuyuki Nogami

    Proceedings of 2018 Symposium on Cryptography and Information Security   2018.1

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    researchmap

  • Observation of Distribution on Multi-value Pseudo Random Sequence Generated by Primitive Polynomial over Odd Characteristic Field

    Chiaki Ogawa, Yuta Kodera, Takeru Miyazaki, Satoshi Uehara, Takuya Kusaka, Yasuyuki Nogami

    40th   2017.12

     More details

    Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • A Consideration of an Efficient Trace Calculation for a Pseudorandom Generator

    Yuta Kodera, Chiaki Ogawa, Hideaki Muraoka, Shunsuke Araki, Takeru Miyazaki, Satoshi Uehara, Takuya Kusaka, Yasuyuki Nogami

    40th   588 - 592   2017.12

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Research paper, summary (national, other academic conference)  

    J-GLOBAL

    researchmap

  • A Consideration of an Efficient Calculation over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography

    Yuta Kodera, Sylvain Duquesne, Masaaki Shirase, Yasuyuki Nogami

    IEICE Technical Report   116 ( 163(IT2016-30) )   51 - 56   2016.7

     More details

    Authorship:Lead author   Language:Japanese   Publishing type:Internal/External technical report, pre-print, etc.  

    J-GLOBAL

    researchmap

▼display all

Awards

  • 仁科賞

    2020.3   仁科顕彰会  

     More details

  • 第2回金光賞

    2019.3   岡山大学  

     More details

  • Best Paper Award

    2017.6   2017 IEEE ICCE-TW  

     More details

Research Projects

  • A Study of Parallel Pseudorandom Number Generator for Cryptographic Applications

    Grant number:20K23327  2020.09 - 2022.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research Grant-in-Aid for Research Activity Start-up  Grant-in-Aid for Research Activity Start-up

    小寺 雄太

      More details

    Grant amount:\2600000 ( Direct expense: \2000000 、 Indirect expense:\600000 )

    researchmap

  • 情報セキュリティ応用のための暗号プリミティブに関する研究

    Grant number:19J11794  2019.04 - 2021.03

    日本学術振興会  科学研究費助成事業 特別研究員奨励費  特別研究員奨励費

    小寺 雄太

      More details

    Grant amount:\1900000 ( Direct expense: \1900000 )

    本研究では社会的に広く利活用される代表的な共通鍵暗号方式であるAES暗号へ焦点を当て,AIによる攻撃を想定した脅威評価・対策立案を目的としていた.目標達成に向け,初年度では確定的な計算により乱数を生成する手法(以下,擬似乱数生成器と呼称)を導入し,AES暗号に対するマスキング(処理の秘匿化)を検討している.さらに,使用する乱数の選定を目的として,暗号用途では不可欠な高い非線形性を有する擬似乱数生成器に着目して評価を行った.
    擬似乱数生成器に関する実績として,報告者はまず脆弱性評価を行った.具体的には,NTU系列と呼ばれる極めて高い非線形性を達成する生成器に対して,生成に使用される加法的なパラメータが脆弱性となりえることを群論と紐づけることで理論的に示した.これにより脆弱性を回避するための推奨パラメータを示したことになる.
    さらに,AI攻撃に対する乱数の有効性を確認するため,ニューラルネットワークを用いた識別実験および乱数値の出力予測を実施した.それぞれの結果として,統計的性質に特徴的な違いがあると識別可能であり,非線形性が低いと出力予測ができることが実験的に判明した.裏を返せば従来の乱数特性を適切に満たすことでAIに対しても有効である可能性が高いといえる.
    上記を踏まえ,AES暗号内の処理をマスキングしたまま実施する手法を提案した.この手法は世界最小ハードウェア実装を実現する構成法をベースとしており,本構成では従来困難であった全処理の秘匿化を達成した.さらに,応用先として検索可能暗号と呼ばれる次世代の暗号方式に着目し,新規の手法を提案した.この手法ではCSVなどの行列形式で表現可能なデータを対象として,キーワードの位置を加味することにより,あるキーワードが重複して存在している場合でも区別して秘匿検索を行うことができる.
    初年度目における業績の概要は以上の通りである.

    researchmap

 

Class subject in charge

  • Security Implementation Exercise A (2022academic year) Summer concentration  - その他

  • Security Implementation Exercise B (2022academic year) Third semester  - その他

  • Introduction to Security (2022academic year) 3rd and 4th semester  - 水7~8

  • Distributed Date Management Training (2022academic year) Summer concentration  - その他

  • Laboratory Work and Practice on Basic Engineering (2022academic year) 1st and 2nd semester  - 火5~8

  • Laboratory Work and Practice on Basic Engineering (2022academic year) 1st and 2nd semester  - 火5~8

  • Laboratory Work and Practice on Basic Engineering (2022academic year) 1st and 2nd semester  - その他

  • Mathematical Cryptography (2022academic year) Prophase  - 木1,木2

  • Specific Research of Electronics and Information Systems Engineering (2022academic year) Year-round  - その他

  • Electrical and Communication Engineering Lab C (2022academic year) 3rd and 4th semester  - 火3~7

  • Security Implementation Exercise A (2021academic year) Summer concentration  - その他

  • Distributed Date Management Training (2021academic year) Summer concentration  - その他

  • Laboratory Work and Practice on Basic Engineering (2021academic year) 1st and 2nd semester  - その他

  • Laboratory Work and Practice on Basic Engineering (2021academic year) 1st and 2nd semester  - 火5,火6,火7,火8

  • Electrical and Communication Engineering Lab C (2021academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

  • Exercises on Cross-site Scripting Prevention (2020academic year) Summer concentration  - その他

  • Basic of information security E (2020academic year) 3rd and 4th semester  - 水7,水8

  • Collision-based Attack on Cryptography for Security Evaluation (2020academic year) Summer concentration  - その他

  • Laboratory Work and Practice on Basic Engineering (2020academic year) 1st and 2nd semester  - 火4,火5,火6,火7

  • Laboratory Work and Practice on Basic Engineering (2020academic year) 1st and 2nd semester  - 火4,火5,火6,火7

  • Cryptographic Hardware Security (2020academic year) Fourth semester  - その他

  • Communication Network Engineering Lab II (2020academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

  • Electrical and Communication Engineering Lab C (2020academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

  • Electrical and Communication Engineering Lab III (2020academic year) 3rd and 4th semester  - 火3,火4,火5,火6,火7

▼display all

 

Social Activities

▼display all

Media Coverage

  • 顧客の行動分析、フードロス削減へ Newspaper, magazine

    株式会社 日本経済新聞社  日本経済新聞社  2022.6.29

     More details

    Author:Other 

    researchmap