Back to Results
First PageMeta Content
Cryptographic hash functions / CRYPTREC / SC2000 / Hierocrypt / FIPS 140-2 / Symmetric-key algorithm / CIPHERUNICORN-E / SHA-1 / CIPHERUNICORN-A / Cryptography / Cryptography standards / Block ciphers


4-9 C  RYPTREC Activities KUROKAWA Takashi and KANAMORI Sachiko In this paper, we show the activity of CRYPTREC between fiscal year 2006 and fiscal year 2010 in the security fundamentals group. We focus on compromise an
Add to Reading List

Document Date: 2013-11-21 21:09:35


Open Document

File Size: 3,07 MB

Share Result on Facebook

Company

Communications Research Laboratory / /

Country

Japan / United States / /

Currency

pence / USD / /

Event

Man-Made Disaster / Diplomatic Relations / /

Facility

National Institute of Standards and Technology / National Institute of Information / /

IndustryTerm

communication technology / software/hardware / information communication system using cryptographic technology / required computer processing performance / cryptographic algorithm / governmental information systems / search algorithm / collision search algorithm / cryptographic module products / affected cryptographic algorithm / secure pseudo-random number generating algorithm / e-government applications / cryptographic algorithms / cryptographic technologies / analysis/attack technologies / information security technology development project / computing / telecommunication network / broken/cracked cryptographic algorithm / electronic commerce / /

Organization

CRYPTREC Organization CRYPTREC Advisory Committee / National Information Security Center / Advisory Board for Cryptographic Technology / National Institute of Information / Telecommunications Advancement Organization of Japan / Communications Technology / Ministry of Economy / Trade and Industry Category / Corporate Department / Cabinet Secretariat / National Institute of Information and Communications Technology / IT Strategy Council / Organization of CRYPTREC / Ministry of Internal Affairs / National Police Agency / Cryptographic Scheme Committee / International Organization for Standardization / National Institute of Standards and Technology / National Institute of Information and Communications Technology Vol. / Cryptographic Module Committee / InformationTechnology Promotion Agency / Cryptographic Module Subcommittee / Ministry of Defense / Ministry of Internal Affairs and Communications / Ministry of International Trade and Industry / Cryptographic Technique Monitoring Subcommittee / Commerce and Information Policy Bureau / Minister’s Secretariat / International Telecommunication Union / Ministry of Foreign Affairs / Cryptographic Operation Committee / FY2003-2008 Fig.3 Former / Advisory Committee / Ministry of Economy / Trade and Industry / /

Position

Director-General for Policy Planning / General / Director-General / Director General / Director-General for Technology Policy Coordination / /

Technology

computer algorithm / Public Key Infrastructure / search algorithm / information communication system using cryptographic technology / collision search algorithm / Keywords Cryptographic algorithm / Communications Technology / private key / communication technology / cryptographically secure pseudo-random number generating algorithm / broken/cracked cryptographic algorithm / cryptographic algorithm / N. The RSA algorithm / Encryption / Cryptography / analysis/attack technologies / public key / affected cryptographic algorithm / cryptographic algorithms / /

SocialTag