Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yasutaka Igarashi is active.

Publication


Featured researches published by Yasutaka Igarashi.


conference on lasers and electro optics | 2013

Electro-absorption modulator integrated laser application to a cube satellite earth station

Seiji Fukushima; Naomasa Miura; Takayuki Shimaki; Kota Yamashita; Taishi Funasako; Tomohiro Hachino; Yasutaka Igarashi

Because of mission extensions, a cube satellite uses several frequencies and its earth station suffers from cabling around antennas. We report an earth station employing an electro-absorption modulator integrated laser in a RoF system.


Archive | 2015

Meet-in-the-middle Attack with Splice-and-Cut Technique on the 19-round Variant of Block Cipher HIGHT

Yasutaka Igarashi; Ryutaro Sueyoshi; Toshinobu Kaneko; Takayasu Fuchida

We show a meet-in-the-middle (MITM) attack with Splice-and-Cut technique (SCT) on the 19-round variant of the block cipher HIGHT. The original HIGHT having 32-round iteration was proposed by Hong et al. in 2006, which applies the 8-branch Type-2 generalized Feistel network (GFN) with 64-bit data block and 128-bit secret key. MITM attack was proposed by Diffie and Hellman in 1977 as a generic method to analyze symmetric-key cryptographic algorithms. SCT was proposed by Aoki and Sasaki to improve MITM attack in 2009. In this paper we show that 19-round HIGHT can be attacked with 28 bytes of memory, 28 + 2 pairs of chosen plain and cipher texts, and 2120.7 times of the encryption operation by using MITM attack with SCT.


conference on lasers and electro optics | 2013

Metal-complex-doped polymer/liquid-crystal composite film operating at wide wavelength range

Seiji Fukushima; Koki Yoshinaga; Hiroki Higuchi; Hirotsugu Kikuchi; Tomohiro Hachino; Yasutaka Igarashi

Doping metal complex into polymer liquid-crystal composite film improves extinction ratio at visible wavelength and extends applicable wavelength to 1.5-μm optical fiber communication band. A polarization dependent loss was measured as 0.32 dB or lower.


advanced information networking and applications | 2017

The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher

Yusuke Takahashi; Yasutaka Igarashi; Toshinobu Kaneko

Midori64 proposed by Banik et al. in 2015 is an SPN-type block cipher with 128-bit secret key. The designers have evaluated the security of Midori64 against differential attack, linear attack, boomerang-type attack, impossible differential attacks, and meet-in-the-middle attack by themselves. In this paper, we discuss higher-order differential attack on Midori64, which has not been analyzed yet. Higher-order differential attack proposed by Lai is one of the generic cryptanalysis technique focusing on degree of boolean polynomial of encryption function. As a result, we show the 12th-order differential attack on the 10-round variant of Midori64 where we exploit partial-sum technique proposed by Ferguson and the first-round key assumption called a round-elimination technique. The original Midori64 is secure against our attack because it consists of 16 round functions.


international conference on information systems security | 2016

A Practical-time Attack on Reduced-round MISTY1.

Nobuyuki Sugio; Yasutaka Igarashi; Toshinobu Kaneko; Kenichi Higuchi

MISTY1 is a symmetric key algorithm which has been standardized by ISO and that its modified version is used in GSM and 3G mobile networks. MISTY1 is a 64-bit block cipher supporting key length of 128 bits. In this paper, we focused on evaluating the security of MISTY1 against higher order differential attack. We show 6-round MISTY1 with 4 FL layers is attackable with 243 blocks of chosen plaintexts and 243.31 times of data encryption. This is the best practical-time attack on reduced-round MISTY1.


Archive | 2015

The Improved 16th-Order Differential Attack on 10- Round Variant of Block Cipher PRESENT

Yasutaka Igarashi; Toshinobu Kaneko; Satoshi Setoguchi; Seiji Fukushima; Tomohiro Hachino

We study the improved 16th-order differential attack on 10-round variant of PRESENT that is a 64-bit block cipher supporting 80-bit and 128-bit secret keys proposed by Bogdanov et al. in 2007. Higher-order differential attack is one of the cryptanalytic techniques exploiting a low algebraic degree of an encryption/decryption function. In 2013 Wu et al. reported the 16th-order differential attack on 10-round variant of PRESENT, which requires 222.4 pairs of plaintext and ciphertext, and 299.3 times of encryption operation. In this article we adopt partial sum technique to solve an attack equation, which leads to low computational complexity. As a result we show that 10-round variant of PRESENT can be attacked with 222.3 pairs of plaintext and ciphertext, and 281.3 times of encryption operation.


2015 IEEE International Broadband and Photonics Conference (IBP) | 2015

Variable optical attenuator employing a dye-doped (polymer/liquid crystal) composite film

Kazuhiro Ariki; Seiji Fukushima; Tomohiro Hachino; Yasutaka Igarashi; Hiroki Higuchi; Hirotsugu Kikuchi

To clarify extinction mechanism of a dye-doped (polymer/liquid crystal) composite film variable optical attenuator, we evaluated its scattering intensity dependencies on the wavelength and scattering angle. We have obtained some experimental data that suggest Rayleigh scattering is a primary mechanism of extinction.


World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering | 2014

Short-Term Electric Load Forecasting Using Multiple Gaussian Process Models

Tomohiro Hachino; Hitoshi Takata; Seiji Fukushima; Yasutaka Igarashi


Technical report of IEICE. OPE | 2015

Variable Optical Attenuator Employing a Dye-Doped (Polymer/Liquid Crystal) Composite Film

Kazuhiro Ariki; Seiji Fukushima; Hiroki Higuchi; Hirotsugu Kikuchi; Tomohiro Hachino; Yasutaka Igarashi


information technology and computer science | 2014

Meet-in-the-middle Attack on the 6-round Variant of the Block Cipher PRINCE

Yasutaka Igarashi; Toshinobu Kaneko; Satoshi Setoguchi; Seiji Fukushima; Tomohiro Hachino

Collaboration


Dive into the Yasutaka Igarashi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Toshinobu Kaneko

Tokyo University of Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ichiro Iimura

Prefectural University of Kumamoto

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge