T
Toru Akishita
Researcher at Sony Broadcast & Professional Research Laboratories
Publications - 84
Citations - 2712
Toru Akishita is an academic researcher from Sony Broadcast & Professional Research Laboratories. The author has contributed to research in topics: Encryption & Scalar multiplication. The author has an hindex of 21, co-authored 84 publications receiving 2491 citations.
Papers
More filters
Book ChapterDOI
Piccolo: an ultra-lightweight blockcipher
TL;DR: Piccolo is one of the competitive ultra-lightweight blockciphers which is suitable for extremely constrained environments such as RFID tags and sensor nodes and its efficiency on the energy consumption which is evaluated by energy per bit is also remarkable.
Book ChapterDOI
The 128-Bit Blockcipher CLEFIA (Extended Abstract)
TL;DR: A new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is compatible with AES is proposed, which achieves enough immunity against known attacks and flexibility for efficient implementation in both hardware and software.
Book ChapterDOI
Midori: A Block Cipher for Low Energy
Subhadeep Banik,Andrey Bogdanov,Takanori Isobe,Kyoji Shibutani,Harunaga Hiwatari,Toru Akishita,Francesco Regazzoni +6 more
TL;DR: This paper presents the block cipher Midorii¾?, the Japanese translation for the word Green, that is optimized with respect to the energy consumed by the circuit per bt in encryption or decryption operation, and proposes two energy-efficient block ciphers Midori128i½?and Midori64i¼?
Proceedings Article
The 128-bit blockcipher CLEFIA
TL;DR: CLEFIA as mentioned in this paper is a 128-bit blockcipher supporting key lengths of 128, 192 and 256 bits, which is compatible with AES and achieves a good performance profile both in hardware and software.
Journal Article
Zero-value point attacks on elliptic curve cryptosystem
Toru Akishita,Tsuyoshi Takagi +1 more
TL;DR: The zero-value point attack is proposed as an extension of Goubin’s attack and it is noted that this attack and the proposed attack assume that the base point P can be chosen by the attacker and the secret scalar d is fixed, so that they are not applicable to ECDSA signature generation.