ICT development progresses, and many cryptographic algorithms are used. The most of cryptographic algorithms require assumptions to guarantee their security, but it is sometimes not clearly written. This causes many problems. This paper shows previous cases, and suggests to concede cryptographers and system developer each other from an industrial cryptographers viewpoint.
Kazumaro AOKI
NTT Secure Platform Laboratories
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Kazumaro AOKI, "Towards Reducing the Gap between Cryptography and Its Usage" in IEICE TRANSACTIONS on Fundamentals,
vol. E102-A, no. 1, pp. 11-16, January 2019, doi: 10.1587/transfun.E102.A.11.
Abstract: ICT development progresses, and many cryptographic algorithms are used. The most of cryptographic algorithms require assumptions to guarantee their security, but it is sometimes not clearly written. This causes many problems. This paper shows previous cases, and suggests to concede cryptographers and system developer each other from an industrial cryptographers viewpoint.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E102.A.11/_p
Copy
@ARTICLE{e102-a_1_11,
author={Kazumaro AOKI, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Towards Reducing the Gap between Cryptography and Its Usage},
year={2019},
volume={E102-A},
number={1},
pages={11-16},
abstract={ICT development progresses, and many cryptographic algorithms are used. The most of cryptographic algorithms require assumptions to guarantee their security, but it is sometimes not clearly written. This causes many problems. This paper shows previous cases, and suggests to concede cryptographers and system developer each other from an industrial cryptographers viewpoint.},
keywords={},
doi={10.1587/transfun.E102.A.11},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Towards Reducing the Gap between Cryptography and Its Usage
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 11
EP - 16
AU - Kazumaro AOKI
PY - 2019
DO - 10.1587/transfun.E102.A.11
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E102-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2019
AB - ICT development progresses, and many cryptographic algorithms are used. The most of cryptographic algorithms require assumptions to guarantee their security, but it is sometimes not clearly written. This causes many problems. This paper shows previous cases, and suggests to concede cryptographers and system developer each other from an industrial cryptographers viewpoint.
ER -