CRYPTEREC Cryptography Research and Evaluation Committees
JAPANESE
About CRYPTREC
Organization of CRYPTREC
History of CRYPTREC
CRYPTREC Report
Technical Report
e-Government Recommended Ciphers List
Specifications of e-Government Recommended Ciphers
Guide to Related Organizations
Technical Report
To assure information security of e-Government in Japan, and to realize fair and adequate evaluation of cryptographic techniques, CRYPTREC commisions the research and investigation to experts in cryptographic research besides the committee members, as a part of committee activities.
The targets of research and investigations have been selected by the Cryptographic Technique Evaluation Committee up to FY 2002, by the Cryptographic Technique Monitoring Subcommittee up to FY 2006, and by the Cryptographic Scheme Committee in and after FY 2010. The reports are publicized on this website to facilitate cryptographic research.
* The linked documents are written in Japanese, except for those from overseas.
2013 | 2012 | 2011 | 2010 |
2006 | 2005 | 2004 | 2003 | 2002(No.0001-) | (No.0100-) | (No.0130-) | Reports from Overeas

Investigation Reports on Cryptographic Techniques in FY 2013
No. Title Authors FY PDF Files
2301 Performance Evaluation of Hash Functions, SHA-224, SHA-512/224, SHA-512/256, and SHA-3 (Keccak) Kazuo Sakiyama 2013 PDF2301(495KB)
ページトップへ

Investigation Reports on Cryptographic Techniques in FY 2012
No. Title Authors FY PDF Files
2201 Related-key cryptanalysis of AES, Hierocrypt-3, and CipherUnicorn-A Dmitry Khovratovich 2012 PDF2201(557KB)
2202 Security analysis of the Block cipher Camellia
Security analysis of the Block cipher CLEFIA
Security analysis of the Block cipher SC2000
Alex Biryukov 2012 PDF2202-1(325KB)
PDF2202-2(163KB)
PDF2202-3(284KB)
2203 Security evaluation of 128-bit block ciphers AES, CIPHERUNICORN-A, and Hierocrypt-3 against biclique attacks Christian Rechberger 2012 PDF2203(164KB)
2204 Security Evaluation of Block Ciphers AES, Camellia, CLEFIA and SC2000 using Two New Techniques: Biclique Attacks and Zero-Correlation Linear Attacks Andrey Bogdanov 2012 PDF2204(1.4MB)
2205 Security evaluation of RC4 stream cipher Takanori Isobe 2012 PDF2205(454KB)
ページトップへ

Investigation Reports on Cryptographic Techniques in FY 2011
No. Title Authors FY PDF Files
2101 Re-evaluation of Security against Linear Cryptanalysis of Block Ciphers in the CRYPTREC list Toshinobu Kaneko 2011 PDF2101(521KB)
ページトップへ

Investigation Reports on Cryptographic Techniques in FY 2010
No. Title Authors FY PDF Files
2001 Security Evaluation of the Blockcipher CLEFIA(March 29, updated) Toshinobu Kaneko 2010 PDF2001(3253KB)
2002 Evaluation of security level of CLEFIA 2010 PDF2002(132KB)
2003 Security Evaluation Report of HyRAL(March 1, updated) Tetsu Iwata 2010 PDF2003_2(508KB)
2004 Security Analysis of HyRAL Heung Youl YOUM, Jung Hwan Song, Sun Young Lee 2010 PDF2004(2467KB)
2005 Security Evaluation of PC-MAC-AES Lei Wang
Kazuo Sakiyama
Iwamasa Nishikado
Kazuo Ohta
2010 PDF2005(3471KB)
2006 CRYPTREC evaluation report on PC-MAC-AES John P.Steinberger 2010 PDF2006(299KB)
2007 Security Evaluation of the Enocoro-128v2 Hidenori Kuwakado 2010 PDF2007(403KB)
2008 Security Evaluation of Stream Cipher Enocoro-128v2 Martin Hell and Thomas Johansson 2010 PDF2008(233KB)
2009 Security Evaluation of the KCipher-2 Yoshiaki Shiraishi 2010 PDF2009(405KB)
2010 Security Evaluation of the K2 Stream Cipher(March 29, updated) Bart Preneel 2010 PDF2010(313KB)
2011 Investigation Report on Security of Block-Cipher Modes of Operation and Message Authentication Codes Shoichi Hirose 2010 PDF2011(522KB)
2012 Evaluation of some Blockcipher Modes of Operation(March 4, updated) Phillip Rogaway 2010 PDF2012(1446KB)
2013 Security Evaluation of ISO/IEC 9798 Protocols Akihiro Yamamura 2010 PDF2013(210KB)
2014 Evaluation of ISO/IEC 9798 Protocols(April 19,updated) David Basin and Cas Cremers 2010 PDF2014_2(217KB)
ページトップへ

Investigation Reports on Cryptographic Techniques in FY 2006
No. Title Authors FY PDF Files
0601 Evaluation of Complexity of Mathematical Algorithms Thorsten Kleinjung 2006 PDF0601(160KB)
0602 Research and Evaluation Report on Computational Complexity of Discrete Logarithm Problems Shigenori Uchiyama 2006 PDF0602(220KB)
0603 Investigation Report on the Trend of Quantum Information Technologies and Their Problems in e-Government Use Hideki Imai 2006 PDF0603(637KB)
ページトップへ
Investigation Reports on Cryptographic Techniques in FY 2005
No. Title Authors FY PDF Files
0501 Safety evaluation and attack method analysis of hash function(SHA-1) - 2005 PDF0501(2.9MB)
0503 On the Security of SHA-256/-384/-512 Toshinobu Kaneko 2005 PDF0503(210KB)
0504 Technical Investigation Report on Security Evaluations on Hash Functions Whirlpool and RIPEMD-160 and How to Strengthen SHA-1 Soichi Furuya 2005 PDF0504(251KB)
0505 Overseas investigation concerning nation policy for cryptographic algorithms - 2005 PDF0505(153KB)
ページトップへ
Investigation Reports on Cryptographic Techniques in FY 2004
No. Title Authors FY PDF Files
0211 Investigation Report on Test Methods of the Pseudo Random Number Generating System Toshinobu Kaneko 2004 PDF0211(1.6MB)
0212 Investigation Report on Test Method of the Pseudo Random Number Generating System -Discrete Fourier Transform of NIST SP800-22- Shoichi Hirose 2004 PDF0212(110KB)
0213 Technical Investigation Report on the Security of Hash Functions Shiho Moriai 2004 PDF0213(1.1MB)
ページトップへ
Investigation Reports on Cryptographic Techniques in FY 2003
No. Title Authors FY PDF Files
0201 Research and Investigation Report on Integer Factoring Experiments Yuji Kida 2003 PDF0201(285KB)
0202
-1
Evaluation Report on Integer Factoring Problems Kazumaro Aoki
Hiroki Ueda
Shigenori Uchiyama
2003 PDF0202-1 (157KB)
0202
-2
Research and Investigation Report on Integer Factoring Problem:
- Report on the Implementation of SQUFOF Factoring Method -
2002 PDF0202-2(130KB)
0203 Research and Investigation on the Polynomial Selection Part, the Linear Algebra part, and the Ideal Square Root Calculation Part of Number Field Sieve Method Takeshi Shimoyama
Tetsuya Izu
2003 PDF0203(2.23MB)
0204 Investigation on Security of Block Cipher Modes of Operation Tetsu Iwata 2003 PDF0204(319KB)
0205 Technical Survey on Modes of Operation for Confidentiality - 2003 PDF0205(325KB)
0206 Investigation Report on Test Methods of Pseudo random Number Generator System
- Lempel-Ziv Compression Test -
Toshinobu Kaneko 2003 PDF0206(77KB)
0207 Investigation Report on the Method of Pseudo Random Number Generator System Shoichi Hirose 2003 PDF0207(233KB)
0208 Report on Investigation and Examination of Integer Factorization Hardware Tetsuya Izu
Koichi Itoh
Jun Kogure
Kiyoshi Kohiyama
Takeshi Shimoyama
Masahiko Takenaka
Naoya Torii
Shoichi Masui
Kenji Mukaida (*)
2003 PDF0208(1.29MB)
0209 Evaluation on Implementability of an Integrated Circuit Dedicated to Integer Factorization - 2003 PDF0209(1.5MB)
0210 Investigation Report on Security of SSL (Details) - 2003 PDF0210(10.9MB)
ページトップへ
Investigation Reports on Cryptographic Algorithms and Related Technologies in FY 2002(No.0001-0039)
No. Title Authors FY PDF Files
0001 Evaluation Report on DSA Signature Tatsuaki Okamoto
Masayuki Abe
2001 PDF01(203KB)
0002 Evaluation Report on DSA Signature - 2001 PDF02(204KB)
0003 Evaluation Report on ECDSA Atsushi Shimbo
Akito Niwa
Koji Okada
2001 PDF03(198KB)
0004 Evaluation Report on ECDSA Tatsuaki Okamoto 2002 PDF04(103KB)
0005 Detailed Evaluation Report on ESIGN Signature System - 2001 PDF05(190KB)
0006 Evaluation Report on Cryptographic Algorithm RSA-OAEP Eiichiro Fujisaki 2001 PDF06(64KB)
0007 Evaluation Report on RSA Encryption/Signature Kazuo Ota 2001 PDF07(331KB)
0008 Evaluation Report on Cryptographic Algorithm RSA-PSS Atsushi Fujioka 2001 PDF08(63KB)
0009 Unused number - - -
0010 Report on RSA (PKCS#1 v1.5) Kazuo Ota 2002 PDF09(209KB)
0011 Evaluation Report on Cryptographic Algorithm
- EPOC-2 and a Revised Version of EPOC-2
Hajime Watanabe 2001 PDF10(289KB)
0012 Evaluation Report on EPOC-2 - 2001 PDF11(171KB)
0013 Unused number - - -
0014 Evaluation Report on Cryptographic Algorithm
- PSEC-2 and PSEC-KEM
Hajime Watanabe 2001 PDF12(209KB)
0015 Detailed Evaluation Report on PSEC-KEM Algorithm - 2001 PDF13(98KB)
0016 Security Evaluation of PSEC-KEM - 2002 PDF14(106KB)
0017 Security Evaluation of PSEC-KEM - 2002 PDF15(694KB)
0018 Factoring Report Preda Mihailescu 2001 PDF16(131KB)
0019 Investigation and Research Report on Prime Factor Solution Problems - 2001 PDF17(202KB)
0020 Unused number - - -
0021 Report on Detailed Evaluation of Cryptographic Algorithm Yuji Kida 2001 PDF18(549KB)
0022 Investigation and Study of Mathematical Algorithm
- Discrete Logarithm Problems concerning Multiplicative Group of Finite Field -
- 2001 PDF19(583KB)
0023 Study and Investigation on Mathematical Algorithm - 2002 PDF20(323KB)
0024 Security of CIPHERUNICORN-E Masayuki Kanda 2001 PDF21(93KB)
0025 Detailed Investigation Report on Security of Symmetric Block Cipher CIPHERUNICORN-E Toshinobu Kaneko 2001 PDF22(172KB)
0026 Security of CIPHERUNICORN-A Masayuki Kanda 2001 PDF23(323KB)
0027 Detailed Investigation Report on Security of Symmetric Block Cipher CIPHERUNICORN-A Toshinobu Kaneko 2001 PDF24(338KB)
0028 Evaluation Report on Cryptographic Algorithm (SEED) Shiho Moriai 2001 PDF25(355KB)
0029 Detailed Investigation Report on Security of Pseudo Random Number Generator Toshinobu Kaneko 2002 PDF26(258KB)
0030 Security Evaluation Report on MULTI-S01 Tetsu Iwata 2001 PDF27(877KB)
0031 Investigation of RC4/arcfour Yoshiaki Shiraishi 2001 PDF28(153KB)
0032 Evaluation of Cryptographic Algorithm Hidenori Kuwakado 2001 PDF29(184KB)
0033 Investigation Report on Security of SSL - 2001 PDF30(226KB)
0034 Investigation Report on Security of SSL
- Key Agreement Method and Signature Method using RSA Cryptograph -
Hajime Watanabe 2001 PDF31(288KB)
0035 Evaluation Report on Security of SSL - 2001 PDF32(288KB)
0036 Detailed Evaluation Report on Security of RC2 - 2001 PDF33(693KB)
0037 Evaluation of Cryptographic Algorithm PANAMA Masahiko Tekenaka
Naoya Torii
2001 PDF34(1,645KB)
0038 Investigation Report on Evaluation of Security of Cryptographic Protocol - 2002 PDF35(1,297KB)
0039 Investigation Report on Integer Factoring (Matrix Calculation Step) Circuit by Bernstein, A.K. Lenstra, et al. - 2002 PDF36(279KB)
ページトップへ
Investigation Report on Cryptographic Algorithm and Related Technology in FY 2002 (No.0100-0129)
No. Title Authors FY PDF Files
0100 Evaluation of Defacto Cryptographic Algorithms Atsuko Miyaji 2000 PDF100(1,715KB)
0101 Detailed Evaluation Report on ECDSA Tatsuaki Okamoto
Atsushi Fujioka
2000 PDF101(48KB)
0102 Detailed Evaluation Report on ESIGN Signature Atsushi Shimbo
Hideo Shimizu
Koji Okada
Akito Niwa
2000 PDF102(158KB)
0103 Evaluation Report on RSA-PSS - 2000 PDF103(371KB)
0104 1. Detailed Evaluation (Attack Evaluation) of Cryptographic Algorithm "EPOC" Report - 2000 PDF104-2(12KB)
2. Summary of Report
0105 Detailed Evaluation Report on ECAES Tatsuaki Okamoto
Atsushi Fujioka
2000 PDF105(61KB)
0106 Detailed Evaluation Report on Security (HIME-1) - 2000 PDF106(114KB)
0107 Detailed Evaluation Report on Security of HIME-2 - 2000 PDF107(267KB)
0108 1. Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "ECDHS (Elliptic Curve Diffie-Hellman Scheme) in SEC1" - 2000 PDF108-1(340KB)
2. Summary of Report PDF108-2(18KB)
0109 Detailed Evaluation Report on Cryptographic Algorithm PSEC - 2000 PDF109(190KB)
0110 Detailed Evaluation Report on Avalanche Test - 2000 PDF110(7,036KB)
0111 Detailed Evaluation Report on Security of Common Key Block Cipher CIPHERUNICORN-E Takeshi Shimoyama 2000 PDF111(103KB)
0112 Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of CIPHERUNICORN-E Masayuki Kanda 2000 PDF112-1(53KB)
PDF112-2(121KB)
0113 1.Higher-Order Differentialof CRYPTREC Submission Encryption and Security against Interpolation Attacks Toshinobu Kaneko 2000 PDF113-1(189KB)
2.Appendix A: CIPHERUNICORN-E PDF113-2(88KB)
3.Appendix B: MISTY1 PDF113-3(81KB)
4.Appendix C: FEAL-NX PDF113-4(218KB)
5.Appendix D: Hierocrypt (-L1, 3) PDF113-5(175KB)
6.Appendix E: CIPHERUNICORN-A PDF113-6(112KB)
7.Appendix F: Camellia PDF113-7(78KB)
8.Appendix G: RC6 PDF113-8(253KB)
9.Appendix H: SC2000 PDF113-9(124KB)
10.Appendix I: MARS PDF113-10(53KB)
11.Appendix J: Linear Sum Attack Resistance of Encryption subject to Detailed Evaluation PDF113-11(71KB)
0114 1. Detailed Evaluaiton (HW Implementation Evaluation) Report on Cryptographic Algorithm "Hierocrypt-L1" - 2000 PDF114-1(480KB)
2.Summary of Report PDF114-2(29KB)
0115 Detailed Evaluation Report on Security of Hierocrypt-L1 - 2000 PDF115(161KB)
0116 Maximum Linear/Differential Probability and Maximum Linear/ Probability Differential Characteristic of Hierocrypt-L1 Shiho Moriai 2000 PDF116-1(29KB)
PDF116-2(81KB)
0117 Detailed Evaluation of Security of MISTY1 Kenji Ohkuma
Fumihiko Sano
2000 PDF117-1(18KB)
PDF117-2(89KB)
0118 Evaluation Report on MISTY1 H/W Implementation Masahiko Motoyama
Masue Shiba
2000 PDF118(71KB)
0119 Probability Maximum Differential/Linear Probability of MISTY Masayuki Kanda 2000 PDF119(116KB)
0120 On Triple DES - 2000 PDF120(305KB)
0121 On Rijndael - 2000 PDF121(282KB)
0122 Outline of Detailed Evaluation/Detailed Evaluation Report on Evaluation of Camellia Attack - 2000 PDF122-1(10KB)
PDF122-2(139KB)
0123 Evaluation Report on CAMELLIA H/W Implementation Masahiko Motoyama
Masue Shiba
2000 PDF123(65KB)
0124 Maximum Differential Characteristic Probability and Maximum Linear Characteristic Probability of Camellia Masayuki Kanda 2000 PDF124-2(121KB)
0125 Detailed Evaluation Report Concerning Security of Common Key Block Cipher CIPHERUNICORN-A Takeshi Shimoyama 2000 PDF125(148KB)
0126 Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of CIPHERUNICORN-A Masayuki Kanda 2000 PDF126-1(48KB)
PDF126-2(124KB)
0127 1.Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "Hierocrypt-3" - 2000 PDF127-1(450KB)
2.Summary of Report PDF127-2(29KB)
0128 Detailed Evaluation Report on Security of Hierocrypt-3 - 2000 PDF128(232KB)
0129 Maximum Linear/Differential Probability and Maximum Linear/Probability Differential Characteristic of Hierocrypt-3 Shiho Moriai 2000 PDF129-1(29KB)
PDF129-2(77KB)
ページトップへ
Investigation Reports on Cryptographic Algorithms and Related Technologies in FY 2002(No.0130-0157)
No. Title Authors FY PDF Files
0130 1.Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "RC6" - 2000 PDF130-1(263KB)
2. Summary of Report PDF130-2(29KB)
0131 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "RC6" - 2000 PDF131-1(216KB)
2.Summary of Report PDF131-2(14KB)
0132 Detailed Evaluation of Cryptographic Algorithm Maximum Linear/Differential Probability and Maximum Linear/ Probability Differential Characteristic of 128bit-Block Cipher RC6 Kazumaro Aoki 2000 PDF132(100KB)
0133 Detailed Evaluation of Security of SC2000 Kenji Ohkuma
Fumihiko Sano
2000 PDF133-1(15KB)
PDF133-2(85KB)
0134 Detailed Evaluation of Cryptographic Algorithm Maximum Linear/Differential Probability and Maximum Linear/Differential Characteristic Probability of 128bit-Block Cipher SC2000 Kazumaro Aoki 2000 PDF134(79KB)
0135 Outline of H/W Implementation Evaluation (MULTI-S01)/Detailed Evaluation Report MULTI-S01H/W Implementation Evaluation - 2000 PDF135-1(9KB)
PDF135-2(89KB)
0136 1.Detailed Evaluation Report on Cryptographic Algorithm Stream Cipher MULTI-S01 - 2000 PDF136-1(112KB)
2.Data used for Evaluation of MULTI-S01 Encryption PDF136-2(54KB)
3.Evaluation of Stream Cipher Long-Period Linkage Test MULTI-S01 PDF136-3(42KB)
4.Evaluation of Stream Cipher
Linkage Test  MULTI-S01
PDF136-4(73KB)
5.Evaluation of Stream Cipher
0/1 Balance Test  MULTI-S01
PDF136-5(47KB)
6.Evaluation of Stream Cipher Mutual Information Test MULTI-S01 PDF136-6(31KB)
7.Evaluation of Stream Cipher Linear Complexity Test MULTI-S01 PDF136-7(39KB)
8.Evaluation of Stream Cipher Uniformity Test MULTI-S01 PDF136-8(45KB)
0137 1.Detailed Evaluation Report on Cryptographic Algorithm Pseudo Random Number Generator PANAMA (MULTI-S01 Inside) - 2000 PDF137-1(54KB)
2.Type of Key Used for Evaluation of PANAMA PDF137-2(84KB)
3.Evaluation of Pseudo Random Number Generator
0/1 Balance Test  for PANAMA (MULTI-S01)
PDF137-3(32KB)
4.Evaluation of Pseudo Random Number Generator
Avalanche Test  for PANAMA (MULTI-S01)
PDF137-4(41KB)
5.Evaluation of Pseudo Random Number Generator Uniformity Test for PANAMA (MULTI-S01) PDF137-5(35KB)
6.Evaluation of Pseudo Random Number Generator Long-Period Linkage Test for PANAMA (MULTI-S01) PDF137-6(41KB)
7.Evaluation of Pseudo Random Number Generator Linkage Test for PANAMA (MULTI-S01) PDF137-7(47KB)
8.Evaluation of Pseudo Random Number Generator Linear Complexity Test for PANAMA (MULTI-S01) PDF137-8(35KB)
0138 Detailed Evaluation of Cryptographic Algorithms Satoshi Uehara 2000 PDF138-1(99KB)
PDF138-2(14KB)
PDF138-3(13KB)
PDF138-4(13KB)
PDF138-5(13KB)
PDF138-6(9KB)
PDF138-7(12KB)
PDF138-8(15KB)
PDF138-9(15KB)
PDF138-10(17KB)
PDF138-11(15KB)
PDF138-12(13KB)
0139 Other Cryptographic Algorithms which need to be evaluated
Investigation on Hash Functions
LEE Seon Young 2000 PDF139(524KB)
0140 Pseudo random Number Generator with SHA-1 - 2000 PDF140(258KB)
0141 Evaluation Report on ACE Encryption Attack/General - 2000 PDF141-1(23KB)
PDF141-2(176KB)
0142 Detailed Evaluation Report on MY-ELLY ECMR-XXX-h - 2000 PDF142(65KB)
0143 Evaluation Report on ACE Signature Attack/General - 2000 PDF143-1(18KB)
PDF143-2(123KB)
0144 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "ECMQVS (Elliptic Curve MQV Scheme) in SEC1" - 2000 PDF144-1(135KB)
2.Summary of Report PDF144-2(17KB)
0145 Outline of Detailed Evaluation of HDEF-ECDH/Detailed Evaluation Report on HDEF-ECDH - 2000 PDF145-1(9KB)
PDF145-2(60KB)
0146 Detailed Evaluation Report on ESIGN Authentication Atsushi Shimbo
Hideo Shimizu
Koji Okada
Akito Niwa
2000 PDF146(157KB)
0147 Outline of Detailed Evaluation of FEAL-NX/Detailed Evaluation Report on Cryptanalysis against FEAL-NX - 2000 PDF147-1(9KB)
PDF147-2(95KB)
0148 Outline of Detailed Evaluation of FEAL-NX/Detailed Evaluation Report on Cryptanalysis against FEAL-NX - 2000 PDF148-1(258KB)
PDF148-2(29KB)
0149 Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "FEAL-NX" "FEAL-NX"/Summary of Report Masayuki Kanda 2000 PDF149-1(47KB)
PDF149-2(103KB)
0150 1.Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of FEAL - 2000 PDF150-1(447KB)
2.Summary of Report PDF150-2(29KB)
0151 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "MARS" - 2000 PDF151-1(426KB)
2.Summary of Report PDF151-2(14KB)
0152 Probability Maximum Differential/Linear Characteristics of MARS Shiho Moriai 2000 PDF152-1(25KB)
PDF152-2(113KB)
0153 Outline of H/W Implementation Evaluation (TOYOCRYPT-HS1)/Detailed Evaluation Report Evaluation of TOYOCRYPT-HS1 H/W Implementation - 2000 PDF153-1(9KB)
PDF153-2(32KB)
0154 Evaluation Report on TOYOCRYPT-HS1/Gist of Evaluation - 2000 PDF154-1(12KB)
PDF154-2(160KB)
0155 1.Detailed Evaluation Report on Cryptographic Algorithm Stream Cipher TOYOCRYPT-HS1 - 2000 PDF155-1(58KB)
2.Type of Keys Used for Evaluation of TOYOCRYPT Series PDF155-2(52KB)
3.Evaluation of Stream Cipher Mutual Information Test TOYOCRYPT-HS1 PDF155-3(26KB)
0156 Evaluation Report on TOYOCRYPT-HR1/Gist of Evaluation - 2000 PDF156-1(12KB)
PDF156-2(167KB)
0157 1.Detailed Evaluation Report on Cryptographic Algorithm Pseudo random Number Generator TOYOCRYPT-HR1 - 2000 PDF157-1(166KB)
2.Type of Key Used for Evaluation of TOYOCRYPT Series PDF157-2(52KB)
3.Evaluation of Pseudo random Number Generator Long-Period Linkage Test for TOYOCRYPT-HR1 PDF157-3(42KB)
4.Evaluation of Pseudo Random Number Generator 0/1 Balance Test for TOYOCRYPT-HR1 PDF157-4(30KB)
5.Evaluation of Pseudo Random Number Generator Linear Complexity Test for TOYOCRYPT-HR1 PDF157-5(44KB)
6.Evaluation of Pseudo Random Number Generator Avalanche Test for TOYOCRYPT-HR1 PDF157-6(42KB)
7.Evaluation of Pseudo Random Number Generator Uniformity Test for TOYOCRYPT-HR1 PDF157-7(34KB)
8. Evaluation of Pseudo random Number Generator
Linkage Test  for TOYOCRYPT-HR1
PDF157-8(46KB)
ページトップへ
List of Cryptographic Algorithms and Related Techniques Evaluation Reports in FY2002 (Overseas)
No. Classification Title Authors year PDF Files
1001 DSA DSA-Security Evaluation
of the Signature Scheme
and Primitive-
Jean-Jacques Quisquater 2001 PDF1001(183KB)
1002 DSA Evaluation Report on DSA Serge Vaundenay 2001 PDF1002(205KB)
1003 DSA The Digital Signature Algorithm
(DSA)
Johannes Buchmann 2001 PDF1003(246KB)
1004 ECDSA Evaluation Report on the
ECDSA signature scheme
Jaques Stern 2001 PDF1004(234KB)
1005 ECDSA Evaluation Report on ECDSA Serge Vaudenay 2001 PDF1005(235KB)
1006 ECDSA Security Level of
Cryptography-ECDSA
Dan Boneh
and Phillip Rogaway
2001 PDF1006(158KB)
1007 ESIGN A review of the ESIGN
digital signature standard
Nicholas Howgrave-Graham 2001 PDF1007(167KB)
1008 ESIGN Approximate l -th roots
moduro n
Brigitte Vallee 2001 PDF1008(175KB)
1009 ESIGN Evaluation Report on the
ESIGN signature scheme
Jaques Stern 2001 PDF1009(200KB)
1010 ESIGN Security of N=P2Q in ESIGN/
The size of the exponent in ESIGN
Marc Girault and
Jean-Francois Misarsky
2001 PDF1010(152KB)
1011 RSA-OAEP/RSA
Signature
Evaluation of Security Level of Cryptography:RSA-OAEP,
RSA-PSS,RSA Signature
Alfred Menezes 2001 PDF1011(141KB)
1012 RSA-OAEP/RSA
Signature
Evaluation Report on the
RSA-OAEP encryption scheme
Jaques Stern 2001 PDF1012(310KB)
1013 RSA-PKCS Evaluation of
Cryptographic Techniques
Jean-Sebastien Coron 2002 PDF1013(393KB)
1014 RSA-PKCS Evaluation of Security Level of Cryptography:RSA Signature Schemes
(PKCS#1 v1.5,ANSI X9.31,ISO9796)
Alfred Menezes 2002 PDF1014(114KB)
1015 ECIES ECIES-Security Evaluation of
the Encryption Scheme and
Primitives-
Jean-Jacques Quisquater 2002 PDF1015(255KB)
1016 ECIES Evaluation Report on the
ECIES Cryptosystem
Jaques Stern 2002 PDF1016(330KB)
1017 HIME
(R)
Evaluation of Security Level of Cryptography:The HIME
(R) Encryption Scheme
Alfred Menezes 2002 PDF1017(131KB)
1018 HIME
(R)
Evaluation Report on the HIME
(R) Cryptosystem
Jaques Stern 2002 PDF1018(326KB)
1019 HIME
(R)
Evaluation Report of HIME
(R)
- 2002 PDF1019(206KB)
1020 PSEC2 Evaluation of Security Level of Cryptography:The Revised Version of PSEC-2
(PSEC-KEM)
Alfred Menezes 2001 PDF1020(95KB)
1021 EPOC2 Evaluation of Security Level of
Cryptography:
The Revised Version of EPOC-2
Alfred Menzes 2001 PDF1021(124KB)
1022 EPOC2 EPOC-2 Security Evaluation of the Encryption Scheme Jean-Jacques Quisquater 2001 PDF1022(191KB)
1023 Factoring
Problem
Evaluation Report on
the Factoring Problem
Jaques Stern 2001 PDF1023(175KB)
1024 Factoring
Problem
Security Level of Cryptography-Integer Factoring Problem
(Factoring N=p2q)
Dan Boneh 2001 PDF1024(141KB)
1025 Factoring
Problem
Report on Integer Factorization Rene Peralta 2001 PDF1025(88KB)
1026 Discrete Logarithm
Problem over Finite
Fields
Computing discrete logarithms in the multiplicative group of a finite field Johannes Buchmann 2001 PDF1026(256KB)
1027 Discrete Logarithm
Problem over Finite
Fields
Evaluation Report on the Discrete Logarithm Problem over finite fields Jaques Stern 2001 PDF1027(162KB)
1028 Elliptic Curve Discrete
Logarithm Preblem
Evaluation of Security Level of Cryptography:The Elliptic Curve Discrete Logarithm Problem
(ECDLP)
Alfred Menezes 2001 PDF1028(149KB)
1029 Elliptic Curve Discrete
Logarithm Preblem
Evaluation Report for CRYPTREC:Security Level of Cryptography {ECDLP Mathematical Problem S.D.Galbraith
and N.P.Smart
2001 PDF1029(293KB)
1030 Generation Methods of
Elliptic Curves
Generartion Methods of Elliptic Curves Harald Baier and
Johannes Buchmann
2002 PDF1030(381KB)
1031 CIPHERUNICORN-E A Crptographic Review of Cipherunicorn E Matt Robshaw 2001 PDF1031(275KB)
1032 CIPHERUNICORN-E An Evaluation of the Security of CipherUnicorn-E Against Certain Attacks David Wagner 2001 PDF1032(93KB)
1033 CIPHERUNICORN-A A Cryptographic Review of Cipherunicorn A Matt Robshaw 2001 PDF1033(267KB)
1034 CIPHERUNICORN-A An Evaluation of the Security of CipherUnicorn-A Against Certain Attacks David Wagner 2001 PDF1034(93KB)
1035 MUGI Evaluation of the MUGI Pseudo-Random Number Generator Ed Dawson,
Gary Carter,
Helen Gustafson,
Matt Henricksen,
Bill Millan and
Leonie Simpson
2002 PDF1035(1,125KB)
1036 MUGI Report on Security Evaluation of MUGI Stream Cipher Miorag Mihaljevic 2002 PDF1036(393KB)
1037 MUGI Security Evaluation of MUGI Jovan Golic 2002 PDF1037(581KB)
1038 MULTI-S01 Security Level of Cryptography-Security evaluation
(especially in mode part)for the stream cipher MULTI-S01
Phillip Rogaway 2001 PDF1038(497KB)
1039 PANAMA1 An Evaluation of the Security of MULTI-S01 David Wagner 2001 PDF1039(53KB)
1040 PANAMA1 Report on Security Evaluation of PANAMA Stream Cipher Miorag Mihaljevic 2001 PDF1040(386KB)
1041 SEED Analysis of SEED - 2001 PDF1041(206KB)
1042 RC2 Analysis of RC2 - 2001 PDF1042(228KB)
1043 RC4 Evaluation of RC4 Stream Cipher Ed Dawson,
Helen Gustafson,
Matt Henricksen and
Bill Millan
2002 PDF1043(752KB)
1044 RC4 Report on Security Evaluation of RC4 Stream Cipher Miorag Mihaljevic 2002 PDF1044(434KB)
1045 SHA256 Evaluation Report Security Level of Cryptography-SHA-256 Helena Handschuh and
Henri Gilbert
2001 PDF1045(405KB)
1046 SHA384/512 Evaluation Report Security Level of Cryptography-SHA-384 and SHA-512 Henri Gilbert
and Helena Handschuh
2001 PDF1046(455KB)
1047 Survey of Side
channel attacks
Side channel attacks Jean-Jacques Quisquater and Francois Koeune 2002 PDF1047(331KB)
1048 ACE Sign Evaluation of the Security of ACE Sign Johannes Buchmann 2000 PDF1048(251KB)
1049 ACE Sign Evaluation of Security Level of Cryptography:ACE Signature Scheme Alfred Menezes et al. 2000 PDF1049(67KB)
1050 ECDSA in SEC1 Evaluation of the Security of ECDSA Johannes Buchmann 2000 PDF1050(251KB)
1051 ECDSA in SEC1 Evaluation of Security Level of Cryptography:ECDSA Signature Scheme Alfred Menezes et al. 2000 PDF1051(117KB)
1052 ESIGN Evaluation of the Security of ESIGN Johannes Buchmann 2000 PDF1052(234KB)
1053 ESIGN Evaluation of Security Level of Cryptography:ESIGN Signature Scheme ALfred Menezes et al. 2000 PDF1053(66KB)
1054 MY-ELLY
ECMR-XXX-h
Evaluation of the Security of My-Ellty ECMR Johannes Buchmann 2000 PDF1054(255KB)
1055 MY-ELLY
ECMR-XXX-h
Evaluation of Security Level of Cryptography:MY-ELLY Signature Scheme Alfred Menezes et al. 2000 PDF1055(84KB)
1056 ACE Encrypt Evaluatio Report on the ACE Encrypt Cryptosystem
-Summary of Evaluation
Jaques Stern 2000 PDF1056(251KB)
1057 ACE Encrypt Security Level of Cryptography-ACE - 2000 PDF1057(61KB)
1058 ECAES in SEC1 Evaluation Report on the ECAES Cryptosystem.
Summary of Evaluation
Jaques Stern 2000 PDF1058(256KB)
1059 ECAES in SEC1 Security Level of Cryptography-ECAES - 2000 PDF1059(67KB)
1060 EPOC Evaluation Report on the EPOC Cryptosystem.
Summary of Evaluation
Jaques Stern 2000 PDF1060(287KB)
1061 EPOC Security Level of Cryptography-EPOC - 2000 PDF1061(70KB)
1062 HIME-2 Evaluation Report on the HIME-2 Cryptosystem Jaques Stern 2000 PDF1062(241KB)
1063 HIME-2 Security Level of Cryptography:HIME-2 - 2000 PDF1063(71KB)
1064 PSEC Evaluation Report on the PSEC Cryptosystem Jaques Stern 2000 PDF1064(277KB)
1065 PSEC Security Level of Cryptography-PSEC - 2000 PDF1065(58KB)
1066 ECDH in SEC1 Evaluation Report on the ECDHS Cryptosystem Jaques Stern 2000 PDF1066(245KB)
1067 ECDH in SEC1 Evaluation of Security Level of Cryptography ECDHS
Phillip Rogaway,
Mihir Bellare
and Dan Boneh
2000 PDF1067(266KB)
1068 ECMQV in SEC1 Evaluation Report on the ECMQVS Cryptosystem Jaques Stern 2000 PDF1068(265KB)
1069 ECMQV in SEC1 Evaluation of Security Level of Cryptography ECMQVS
(from SEC1)
Phillip Rogaway,
Mihir Bellare
and Dan Boneh
2000 PDF1069(223KB)
1070 HDEF-ECDH Evaluation Report on the HDEF-ECDH Cryptosystem. Jaques Stern 2000 PDF1070(252KB)
1071 HDEF-ECDH Evaluation of Security Level of Cryptography HDEF-ECDH Phillip Rogaway,
Mihir Bellare
and Dan Boneh
2000 PDF1071(93KB)
1072 HIME-1 Evaluation Report on the HIME-1 Cryptosystem Jaques Stern 2000 PDF1072(242KB)
1073 SUMMERY Summary of Evaluation Jaques Stern 2000 PDF1073(59KB)
1074 SUMMERY Evaluation of Security Level of Cryptography Key-Sharing Schemes
(Summary)
Phillip Rogaway 2000 PDF1074(58KB)
1075 HIME-1 Evaluation of Security Level of Cryptography HIME-1 Dan Boneh, 2000 PDF1075(144KB)
1076 ESIGN Evaluation of the Security of ESIGN Identification Johannes Buchmann 2000 PDF1076(239KB)
1077 ESIGN Evaluation of Security Level of Cryptography:ESIGN Identification Scheme Alfred Menezes et al. 2000 PDF1077(68KB)
1078 CIPHERUNICORN-E Analysis of four 64-bit Symmetric Ciphers Serge Vaudenay 2000 PDF1078(125KB)
1079 FEAL-NX Analysis of four 64-bit Symmetric Ciphers Serge Vaudenay 2000 PDF1079(128KB)
1080 Hierocrypt-L1 Analysis of four 64-bit Symmetric Ciphers Serge Vaudenay 2000 PDF1080(114KB)
1081 MISTY1 Analysis of four 64-bit Symmetric Ciphers
(Chapter 4)
Serge Vaudenay 2000 PDF1081(119KB)
1082 Camellia Analysis of Camellia - 2000 PDF1082(201KB)
1083 CIPHERUNICORN-A Analysis of Cipherunicorn-A - 2000 PDF1083(196KB)
1084 Hierocrypt-3 Analysis of Hierocrypt-3 - 2000 PDF1084(184KB)
1085 MARS Analysis of MARS - 2000 PDF1085(191KB)
1086 RC6 Analysis of RC6 - 2000 PDF1086(187KB)
1087 SC2000 Analysis of SC2000 - 2000 PDF1087(189KB)
1088 MULTI-S01 Evaluation of MULTI-S01 Ed Dawson,
Andrew Clark, Helen Gustafson, Bill Millan and Gray Carter
2000 PDF1088(635KB)
1089 TOYOCRYPT-HS1 Evaluation of TOYOCRYPT-HS1 Ed Dawson,
Andrew Clark,
Helen Gustafson,
Bill Millan and
Leonie Sipmson
2000 PDF1089(777KB)
1090 TOYOCRYPTR-HR1 Evaluation of TOYOCRYPT-HR1 Ed Dawson,
Andrew Clark,
Helen Gustafson,
Bill Millan and
Leonie Sipmson
2000 PDF1090(839KB)
ページトップへ
About this Site Privacy Policy
If you have any comment or inquiry, send it to the following mail address.
Copyright (c) 2005 CRYPTREC.ALL Rights Reserved.