Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Toru Owada is active.

Publication


Featured researches published by Toru Owada.


international conference on information security and cryptology | 2010

A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW

Shoichi Hirose; Kota Ideguchi; Hidenori Kuwakado; Toru Owada; Bart Preneel; Hirotaka Yoshida

This paper proposes a new lightweight 256-bit hash function Lesamnta-LW with claimed security levels of at least 2120 with respect to collision, preimage, and second preimage attacks. We adopt the Merkle-Damgard domain extension; the compression function is constructed from a dedicated AES-based block cipher using the LW1 mode, for which a security reduction can be proven. In terms of lightweight implementations, Lesamnta-LW offers a competitive advantage over other 256-bit hash functions. Our size-optimized hardware implementation of Lesamnta-LW requires only 8.24 Kgates on 90 nm technology. Our software implementation of Lesamnta-LW requires only 50 bytes of RAM and runs fast on short messages on 8-bit CPUs.


international symposium on information theory and its applications | 2010

Update on Enocoro stream cipher

Dai Watanabe; Toru Owada; Kazuto Okamoto; Yasutaka Igarashi; Toshinobu Kaneko

Enocoro is a family of stream ciphers proposed by Watanabe et al. in 2007. It consists of two algorithms called Enocoro-80 and Enocoro-128v1.1, whose key lengths are 80 bits and 128 bits respectively. In this paper, we show that Enocoro-128v1.1 is vulnerable against the related-key attack in which we assume a stronger attacker than one in the related-key differential attack. The attack is applicable with 2112 out of 2128 keys and the calculation complexity of the attack is about 265. Our attack is mainly of theoretical interest and do not present a threat to practical applications using Enocoro-128v1.1. In addition, we propose to update Enocoro-128v1.1 to Enocoro-128v2 where a patch has been applied to prevent the attack.


Archive | 2000

Information processing apparatus and its display controller

Toru Owada; Isao Takita; Yasushi Nagai; Kanetoshi Saito; Takuichiro Nakazawa


Archive | 2001

Digital copying method and storage device for digital content

Takeshi Asahi; Jun Kitahara; Toru Owada


Archive | 2001

System, method and apparatus for distributing digital contents, information processing apparatus and digital content recording medium

Toru Owada; Jun Kitahara; Takeshi Asahi


Archive | 1999

Display processor and information processor

Akira Kikuchi; Yasushi Nagai; Toru Owada; Tetsuo Takagi; Isao Takita; 徹 大和田; 靖 永井; 功 滝田; 明 菊地; 徹夫 高木


Archive | 2001

Information processing apparatus, display unit, digital content distributing system and digital content distributing/outputting method

Toru Owada; Jun Kitahara; Takeshi Asahi


Archive | 2001

Information storage system, information transfer system and storage medium thereof

Toru Owada; Jun Kitahara; Takeshi Asahi; Takayuki Tamura; Nagamasa Mizushima; Ikuya Kawasaki; Takashi Totsuka


Archive | 1996

Processor and method for information processing

宏之 ▲真▼野; Hiroyuki Mano; Toru Owada; Isao Takita; 徹 大和田; 功 滝田


Archive | 1996

INFORMATION PROCESSOR AND CONTROLLER

宏之 ▲真▼野; Makiko Ikeda; Hiroyuki Mano; Toru Owada; Isao Takita; 徹 大和田; 牧子 池田; 功 滝田

Collaboration


Dive into the Toru Owada's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge