Hirokazu Ishizuka
Mitsubishi Electric
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hirokazu Ishizuka.
public key cryptography | 1998
Yasuyuki Sakai; Kouichi Sakurai; Hirokazu Ishizuka
We investigate the discrete logarithm problem over jacobian varieties of hyperelliptic curves suitable for public-key cryptosystems, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves C : v 2 + v=u 2g+1 of genus g=3 and 11, which are secure against the known attacks. We further discuss the efficiency in implementation of such secure hyperelliptic cryptosystems.
Physics Letters A | 2004
Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka; Kentaro Imafuku; Hideki Imai
Abstract New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the different grounds from that of the conventional ones. We have, then, tried to cryptoanalyze Y-00 protocol in the view of cryptographic communication system. As a result, it turns out that the security of Y-00 protocol is equivalent to that of classical stream cipher.
australasian conference on information security and privacy | 2001
Akihiro Yamamura; Hirokazu Ishizuka
Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. Our aim is to propose practical methods for error detection and authentication in quantum key distribution schemes. We introduce several concepts about neighborhood collision free properties of Boolean functions, which are closely related to hash functions, and propose methods based on neighborhood collision free functions and error correcting codes such as Reed-Solomon code. We also examine whether or not widely used cryptographic hash functions SHA-1 and MD5 satisfy the neighborhood collision free property by computation experiments.
IEEE Photonics Technology Letters | 2002
Tsuyoshi Nishioka; Hirokazu Ishizuka; Toshio Hasegawa; Junichi Abe
Archive | 2002
Tsuyoshi Nishioka; Hirokazu Ishizuka; Toshio Hasegawa
Archive | 2001
Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka
Archive | 2004
Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka
Physics Letters A | 2005
Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka; Kentaro Imafuku; Hideki Imai
Archive | 2004
Junichi Abe; Katsuhiro Shimizu; Toshio Hasegawa; Tsuyoshi Nishioka; Hirokazu Ishizuka
Archive | 2002
Tsuyoshi Nishioka; Hirokazu Ishizuka; Toshiharu Hasegawa; Junichi Abe
Collaboration
Dive into the Hirokazu Ishizuka's collaboration.
National Institute of Information and Communications Technology
View shared research outputs