External Evaluation Reports
To assure information security of e-Government in Japan, and to realize fair and adequate evaluation of cryptographic techniques, CRYPTREC commisions the research and investigation to experts in cryptographic research besides the committee members, as a part of committee activities. The targets of research and investigations have been selected by the Cryptographic Technique Evaluation Committee up to FY 2002, by the Cryptographic Technique Monitoring Subcommittee up to FY 2006, and by the Cryptographic Scheme Committee in and after FY 2010. The reports are publicized on this website to facilitate cryptographic research.
* The linked documents are written in Japanese, except for those from overseas.
Investigation Reports on Cryptographic Techniques in FY 2023
FY | Title | Authors | Document ID |
---|---|---|---|
2023 | Literature Review on Implementation Performance of the NIST Lightweight Cryptographic Standard Ascon | Kazuo Sakiyama | CRYPTREC-EX-3301-2023 |
2023 | A Survey on Standardization Trends of the NIST Lightweight Cryptographic Standard Ascon | GMO Cybersecurity by Ierae, Inc. | CRYPTREC-EX-3302-2023 |
Investigation Reports on Cryptographic Techniques in FY 2022
FY | Title | Authors | Document ID |
---|---|---|---|
2022 | Review and Evaluation of the Security of Lightweight Cryptographic Algorithms (Photon-Beetle, Sparkle, and Tsudik’s keymode) | Tetsu Iwata | CRYPTREC EX-3201-2022 |
2022 | Review and Evaluation of the Security of Lightweight Cryptographic Algorithms (GIFT-COFB and Xoodyak) | Yusuke Naito | CRYPTREC EX-3202-2022 |
2022 | Review and Evaluation of the Security of Lightweight Cryptographic Algorithms (Ascon, Grain-128AEAD, and TinyJambu) | Yosuke Todo | CRYPTREC EX-3203-2022 |
2022 | Review and Evaluation of the Security of Lightweight Cryptographic Algorithms (Elephant, ISAP, and Romulus) | Akiko Inoue | CRYPTREC EX-3204-2022 |
2022 | Literature review on implementation performance of NIST lightweight cryptography competition's finalists | Kazuo Sakiyama | CRYPTREC EX-3205-2022 |
2022 | A Survey on Evaluation Metrics and Standardization Trends of Lightweight Cryptographies(NIST Lightweight Cryptography Competition Finalists) | GMO Cybersecurity by Ierae, Inc. | CRYPTREC EX-3206-2022 |
Investigation Reports on Cryptographic Techniques in FY 2021
FY | Title | Authors | Document ID |
---|---|---|---|
2021 | A Survey on the Security of Lightweight Cryptographic Algorithms | Ryoma Ito | CRYPTREC EX-3101-2021 |
2021 | Survey of implementation performance for Edwards-Curve Digital Signature Algorithm (EdDSA) | Infours Inc. | CRYPTREC EX-3102-2021 |
Investigation Reports on Cryptographic Techniques in FY 2020
FY | Title | Authors | Document ID |
---|---|---|---|
2020 | Survey and security analysis for curves used in the digital signature EdDSA | Masaya Yasuda | CRYPTREC EX-3001-2020 |
2020 | A review of EdDSA's construction | Eiichiro Fujisaki | CRYPTREC EX-3002-2020 |
2020 | CRYPTREC Review of EdDSA | Steven D. Galbraith | CRYPTREC EX-3003-2020 |
2020 | Survey of technology trends in Hybrid Mode for Post-Quantum Cryptography | Lepidum Co. Ltd. | CRYPTREC EX-3004-2020 |
2020 | Survey of Implementation Trends in Shor's Algorithm | Atsushi Takayasu | CRYPTREC EX-3005-2020 |
Investigation Reports on Cryptographic Techniques in FY 2019
FY | Title | Authors | Document ID |
---|---|---|---|
2019 | Review and Evaluation of the Effect of Quantum Computers on the Security of Symmetric-Key Cryptographic Schemes | Akinori Hosoyamada | CRYPTREC EX-2901-2019 |
2019 | Performance Evaluation of XTS | Lepidum Co. Ltd. | CRYPTREC EX-2902-2019 |
Investigation Reports on Cryptographic Techniques in FY 2018
FY | Title | Authors | Document ID |
---|---|---|---|
2018 | Security Evaluation of XTS | Kazuhiko Minematsu | CRYPTREC EX-2801-2018 |
2018 | Evaluation of complexity of the sieving step of the general number field sieve | Thorsten Kleinjung, Arjen K. Lenstra |
CRYPTREC EX-2802-2018 |
Investigation Reports on Cryptographic Techniques in FY 2017
FY | Title | Authors | Document ID |
---|---|---|---|
2017 | Review and Security Evaluation of ChaCha20-Poly1305 and Poly1305 | Tetsu Iwata | CRYPTREC EX-2701-2017 (No.2701) |
2017 | Performance Evaluation of ChaCha20-Poly1305 | Lepidum Co. Ltd. | CRYPTREC EX-2702-2017 (No.2702) |
Investigation Reports on Cryptographic Techniques in FY 2016
FY | Title | Authors | Document ID |
---|---|---|---|
2016 | Security Analysis of ChaCha20-Poly1305 AEAD | KDDI Research, Inc. | CRYPTREC EX-2601-2016 (No.2601) |
2016 | Index Calculus Algorithms for ECDLP§1 | Naoyuki Shinohara, Masayuki Noro, Kazuhiro Yokoyama |
CRYPTREC EX-2602-2016 (No.2602) |
2016 | Cryptographic Multilinear Maps - A Status Report -§2 | Mehdi Tibouchi | CRYPTREC EX-2603-2016 (No.2603) |
- §1:Summary is on page 39-42 of CRYPTREC RP-0002-2016.
- §2:Summary is on page 42-44 of CRYPTREC RP-0002-2016.
Investigation Reports on Cryptographic Techniques in FY 2015
FY | Title | Authors | Document ID |
---|---|---|---|
2015 | The Latest Trend of Integral Attack and Its Application to MISTY1, etc. | Yosuke Todo | CRYPTREC EX-2501-2015 (No.2501) |
2015 | Cryptographic Program Obfuscation§ | Sanjam Garg | CRYPTREC EX-2502-2015 (No.2502) |
§:Summary is on page 53-56 of "CRYPTREC Report 2015; Report of the Cryptographic Technology Evaluation Committee".
Investigation Reports on Cryptographic Techniques in FY 2014
FY | Title | Authors | Document ID |
---|---|---|---|
2014 | Security Evaluation of SHA-224, SHA-512/224, and SHA-512/256 | Christoph Dobraunig, Maria Eichlseder, Florian Mendel | CRYPTREC EX-2401-2014 (No.2401) |
2014 | Security Evaluation of SHA-3 | Itai Dinur | CRYPTREC EX-2402-2014 (No.2402) |
2014 | Security Evaluation Report on SHA-224, SHA-512/224, SHA-512/256, and the six SHA-3 Functions(August 28, 2015, updated) | Donghoon Chang | CRYPTREC EX-2403-2014R1 (No.2403) |
Investigation Reports on Cryptographic Techniques in FY 2013
FY | Title | Authors | Document ID |
---|---|---|---|
2013 | Performance Evaluation of Hash Functions, SHA-224, SHA-512/224, SHA-512/256, and SHA-3 (Keccak) | Kazuo Sakiyama | CRYPTREC EX-2301-2013 (No.2301) |
Investigation Reports on Cryptographic Techniques in FY 2012
FY | Title | Authors | Document ID |
---|---|---|---|
2012 | Related-key cryptanalysis of AES, Hierocrypt-3, and CipherUnicorn-A | Dmitry Khovratovich | CRYPTREC EX-2201-2012 (No.2201) |
2012 | Security analysis of the Block cipher Camellia | Alex Biryukov | CRYPTREC EX-2202-2012P1 (No.2202) |
Security analysis of the Block cipher CLEFIA | Alex Biryukov | CRYPTREC EX-2202-2012P2 (No.2202) |
|
Security analysis of the Block cipher SC2000 | Alex Biryukov | CRYPTREC EX-2202-2012P3 (No.2202) |
|
2012 | Security evaluation of 128-bit block ciphers AES, CIPHERUNICORN-A, and Hierocrypt-3 against biclique attacks | Christian Rechberger | CRYPTREC EX-2203-2012 (No.2203) |
2012 | Security Evaluation of Block Ciphers AES, Camellia, CLEFIA and SC2000 using Two New Techniques: Biclique Attacks and Zero-Correlation Linear Attacks | Andrey Bogdanov | CRYPTREC EX-2204-2012 (No.2204) |
2012 | Security evaluation of RC4 stream cipher | Takanori Isobe | CRYPTREC EX-2205-2012 (No.2205) |
Investigation Reports on Cryptographic Techniques in FY 2011
FY | Title | Authors | Document ID |
---|---|---|---|
2011 | Re-evaluation of Security against Linear Cryptanalysis of Block Ciphers in the CRYPTREC list | Toshinobu Kaneko | CRYPTREC EX-2101-2011 (No.2101) |
Investigation Reports on Cryptographic Techniques in FY 2010
FY | Title | Authors | Document ID |
---|---|---|---|
2010 | Security Evaluation of the Blockcipher CLEFIA (March 29, 2011, updated) | Toshinobu Kaneko | CRYPTREC EX-2001-2010R1 (No.2001) |
2010 | Evaluation of security level of CLEFIA | - | CRYPTREC EX-2002-2010 (No.2002) |
2010 | Security Evaluation Report of HyRAL (March 1, 2011, updated) | Tetsu Iwata | CRYPTREC EX-2003-2010R1 (No.2003) |
2010 | Security Analysis of HyRAL | Heung Youl YOUM, Jung Hwan Song, Sun Young Lee | CRYPTREC EX-2004-2010 (No.2004) |
2010 | Security Evaluation of PC-MAC-AES | Lei Wang, Kazuo Sakiyama, Iwamasa Nishikado, Kazuo Ohta | CRYPTREC EX-2005-2010 (No.2005) |
2010 | CRYPTREC evaluation report on PC-MAC-AES | John P.Steinberger | CRYPTREC EX-2006-2010 (No.2006) |
2010 | Security Evaluation of the Enocoro-128v2 | Hidenori Kuwakado | CRYPTREC EX-2007-2010 (No.2007) |
2010 | Security Evaluation of Stream Cipher Enocoro-128v2 | Martin Hell and Thomas Johansson | CRYPTREC EX-2008-2010 (No.2008) |
2010 | Security Evaluation of the KCipher-2 | Yoshiaki Shiraishi | CRYPTREC EX-2009-2010 (No.2009) |
2010 | Security Evaluation of the K2 Stream Cipher (March 29, 2011, updated) | Bart Preneel | CRYPTREC EX-2010-2010R1 (No.2010) |
2010 | Investigation Report on Security of Block-Cipher Modes of Operation and Message Authentication Codes | Shoichi Hirose | CRYPTREC EX-2011-2010 (No.2011) |
2010 | Evaluation of some Blockcipher Modes of Operation (March 4, 2011, updated) | Phillip Rogaway | CRYPTREC EX-2012-2010R1 (No.2012) |
2010 | Security Evaluation of ISO/IEC 9798 Protocols | Akihiro Yamamura | CRYPTREC EX-2013-2010 (No.2013) |
2010 | Evaluation of ISO/IEC 9798 Protocols (April 19, 2011, updated) | David Basin and Cas Cremers | CRYPTREC EX-2014-2010R1 (No.2014) |
Investigation Reports on Cryptographic Techniques in FY 2006
FY | Title | Authors | Document ID |
---|---|---|---|
2006 | Evaluation of Complexity of Mathematical Algorithms | Thorsten Kleinjung | CRYPTREC EX-0601-2006 (No.0601) |
2006 | Research and Evaluation Report on Computational Complexity of Discrete Logarithm Problems | Shigenori Uchiyama | CRYPTREC EX-0602-2006 (No.0602) |
2006 | Investigation Report on the Trend of Quantum Information Technologies and Their Problems in e-Government Use | Hideki Imai | CRYPTREC EX-0603-2006 (No.0603) |
Investigation Reports on Cryptographic Techniques in FY 2005
FY | Title | Authors | Document ID |
---|---|---|---|
2005 | Safety evaluation and attack method analysis of hash function(SHA-1) | - | CRYPTREC EX-0501-2005 (No.0501) |
2005 | On the Security of SHA-256/-384/-512 | Toshinobu Kaneko | CRYPTREC EX-0503-2005 (No.0503) |
2005 | Technical Investigation Report on Security Evaluations on Hash Functions Whirlpool and RIPEMD-160 and How to Strengthen SHA-1 | Soichi Furuya | CRYPTREC EX-0504-2005 (No.0504) |
2005 | Overseas investigation concerning nation policy for cryptographic algorithms | - | CRYPTREC EX-0505-2005 (No.0505) |
Investigation Reports on Cryptographic Techniques in FY 2004
FY | Title | Authors | Document ID |
---|---|---|---|
2004 | Investigation Report on Test Methods of the Pseudo Random Number Generating System | Toshinobu Kaneko | CRYPTREC EX-0211-2004 (No.0211) |
2004 | Investigation Report on Test Method of the Pseudo Random Number Generating System - Discrete Fourier Transform of NIST SP800-22 - | Shoichi Hirose | CRYPTREC EX-0212-2004 (No.0212) |
2004 | Technical Investigation Report on the Security of Hash Functions | Shiho Moriai | CRYPTREC EX-0213-2004 (No.0213) |
Investigation Reports on Cryptographic Techniques in FY 2003
FY | Title | Authors | Document ID |
---|---|---|---|
2003 | Research and Investigation Report on Integer Factoring Experiments | Yuji Kida | CRYPTREC EX-0201-2003 (No.0201) |
2003 | Evaluation Report on Integer Factoring Problems | Kazumaro Aoki, Hiroki Ueda, Shigenori Uchiyama |
CRYPTREC EX-0202-2003P1 (No.0202-1) |
2002 | Research and Investigation Report on Integer Factoring Problem: - Report on the Implementation of SQUFOF Factoring Method - |
CRYPTREC EX-0202-2003P2 (No.0202-2) |
|
2003 | Research and Investigation on the Polynomial Selection Part, the Linear Algebra part, and the Ideal Square Root Calculation Part of Number Field Sieve Method | Takeshi Shimoyama , Tetsuya Izu |
CRYPTREC EX-0203-2003 (No.0203) |
2003 | Investigation on Security of Block Cipher Modes of Operation | Tetsu Iwata | CRYPTREC EX-0204-2003 (No.0204) |
2003 | Technical Survey on Modes of Operation for Confidentiality | - | CRYPTREC EX-0205-2003 (No.0205) |
2003 | Investigation Report on Test Methods of Pseudo random Number Generator System - Lempel-Ziv Compression Test - |
Toshinobu Kaneko | CRYPTREC EX-0206-2003 (No.0206) |
2003 | Investigation Report on the Method of Pseudo Random Number Generator System | Shoichi Hirose | CRYPTREC EX-0207-2003 (No.0207) |
2003 | Report on Investigation and Examination of Integer Factorization Hardware | Tetsuya Izu, Koichi Itoh, Jun Kogure, Kiyoshi Kohiyama, Takeshi Shimoyama , Masahiko Takenaka, Naoya Torii, Shoichi Masui, Kenji Mukaida(*) |
CRYPTREC EX-0208-2003 (No.0208) |
2003 | Evaluation on Implementability of an Integrated Circuit Dedicated to Integer Factorization | - | CRYPTREC EX-0209-2003 (No.0209) |
2003 | Investigation Report on Security of SSL (Details) | - | CRYPTREC EX-0210-2003 (No.0210) |
Investigation Reports on Cryptographic Algorithms and Related Technologies in FY 2002(No.0001-0039)
FY | Title | Authors | Document ID |
---|---|---|---|
2001 | Evaluation Report on DSA Signature | Tatsuaki Okamoto, Masayuki Abe |
CRYPTREC EX-0001-2001 (No.0001) |
2001 | Evaluation Report on DSA Signature | - | CRYPTREC EX-0002-2001 (No.0002) |
2001 | Evaluation Report on ECDSA | Atsushi Shimbo, Akito Niwa, Koji Okada |
CRYPTREC EX-0003-2001 (No.0003) |
2002 | Evaluation Report on ECDSA | Tatsuaki Okamoto | CRYPTREC EX-0004-2002 (No.0004) |
2001 | Detailed Evaluation Report on ESIGN Signature System | - | CRYPTREC EX-0005-2001 (No.0005) |
2001 | Evaluation Report on Cryptographic Algorithm RSA-OAEP | Eiichiro Fujisaki | CRYPTREC EX-0006-2001 (No.0006) |
2001 | Evaluation Report on RSA Encryption/Signature | Kazuo Ota | CRYPTREC EX-0007-2001 (No.0007) |
2001 | Evaluation Report on Cryptographic Algorithm RSA-PSS | Atsushi Fujioka | CRYPTREC EX-0008-2001 (No.0008) |
2002 | Report on RSA (PKCS#1 v1.5) | Kazuo Ota | CRYPTREC EX-0010-2001 (No.0010) |
2001 | Evaluation Report on Cryptographic Algorithm - EPOC-2 and a Revised Version of EPOC-2 |
Hajime Watanabe | CRYPTREC EX-0011-2001 (No.0011) |
2001 | Evaluation Report on EPOC-2 | - | CRYPTREC EX-0012-2001 (No.0012) |
2001 | Evaluation Report on Cryptographic Algorithm - PSEC-2 and PSEC-KEM |
Hajime Watanabe | CRYPTREC EX-0014-2002 (No.0014) |
2001 | Detailed Evaluation Report on PSEC-KEM Algorithm | - | CRYPTREC EX-0015-2002 (No.0015) |
2002 | Security Evaluation of PSEC-KEM | - | CRYPTREC EX-0016-2001 (No.0016) |
2002 | Security Evaluation of PSEC-KEM | - | CRYPTREC EX-0017-2001 (No.0017) |
2001 | Factoring Report | Preda Mihailescu | CRYPTREC EX-0018-2001 (No.0018) |
2001 | Investigation and Research Report on Prime Factor Solution Problems | - | CRYPTREC EX-0019-2001 (No.0019) |
2001 | Report on Detailed Evaluation of Cryptographic Algorithm | Yuji Kida | CRYPTREC EX-0021-2001 (No.0021) |
2001 | Investigation and Study of Mathematical Algorithm - Discrete Logarithm Problems concerning Multiplicative Group of Finite Field - |
- | CRYPTREC EX-0022-2001 (No.0022) |
2002 | Study and Investigation on Mathematical Algorithm | - | CRYPTREC EX-0023-2001 (No.0023) |
2001 | Security of CIPHERUNICORN-E | Masayuki Kanda | CRYPTREC EX-0024-2001 (No.0024) |
2001 | Detailed Investigation Report on Security of Symmetric Block Cipher CIPHERUNICORN-E | Toshinobu Kaneko | CRYPTREC EX-0025-2001 (No.0025) |
2001 | Security of CIPHERUNICORN-A | Masayuki Kanda | CRYPTREC EX-0026-2002 (No.0026) |
2001 | Detailed Investigation Report on Security of Symmetric Block Cipher CIPHERUNICORN-A | Toshinobu Kaneko | CRYPTREC EX-0027-2001 (No.0027) |
2001 | Evaluation Report on Cryptographic Algorithm (SEED) | Shiho Moriai | CRYPTREC EX-0028-2001 (No.0028) |
2002 | Detailed Investigation Report on Security of Pseudo Random Number Generator | Toshinobu Kaneko | CRYPTREC EX-0029-2001 (No.0029) |
2001 | Security Evaluation Report of MULTI-S01 | Tetsu Iwata | CRYPTREC EX-0030-2001 (No.0030) |
2001 | Investigation of RC4/arcfour | Yoshiaki Shiraishi | CRYPTREC EX-0031-2001 (No.0031) |
2001 | Evaluation of Cryptographic Algorithm | Hidenori Kuwakado | CRYPTREC EX-0032-2001 (No.0032) |
2001 | Investigation Report on Security of SSL | - | CRYPTREC EX-0033-2001 (No.0033) |
2001 | Investigation Report on Security of SSL - Key Agreement Method and Signature Method using RSA Cryptograph - |
Hajime Watanabe | CRYPTREC EX-0034-2001 (No.0034) |
2001 | Evaluation Report on Security of SSL | - | CRYPTREC EX-0035-2001 (No.0035) |
2001 | Detailed Evaluation Report on Security of RC2 | - | CRYPTREC EX-0036-2002 (No.0036) |
2001 | Evaluation of Cryptographic Algorithm PANAMA | Masahiko Takenaka, Naoya Torii |
CRYPTREC EX-0037-2001 (No.0037) |
2002 | Investigation Report on Evaluation of Security of Cryptographic Protocol | - | CRYPTREC EX-0038-2002 (No.0038) |
2002 | Investigation Report on Integer Factoring (Matrix Calculation Step) Circuit by Bernstein, A.K. Lenstra, et al. | - | CRYPTREC EX-0039-2002 (No.0039) |
Investigation Report on Cryptographic Algorithm and Related Technology in FY 2002(No.0100-0129)
FY | Title | Authors | Document ID |
---|---|---|---|
2000 | Evaluation of Defacto Cryptographic Algorithms | Atsuko Miyaji | CRYPTREC EX-0100-2000 (No.0100) |
2000 | Detailed Evaluation Report on ECDSA | Tatsuaki Okamoto, Atsushi Fujioka |
CRYPTREC EX-0101-2000 (No.0101) |
2000 | Detailed Evaluation Report on ESIGN Signature | Atsushi Shimbo, Hideo Shimizu, Koji Okada, Akito Niwa |
CRYPTREC EX-0102-2000 (No.0102) |
2000 | Evaluation Report on RSA-PSS | - | CRYPTREC EX-0103-2000 (No.0103) |
2000 | 1. Detailed Evaluation (Attack Evaluation) of Cryptographic Algorithm "EPOC" Report | - | CRYPTREC EX-0104-2000P1 (No.0104) |
2. Summary of Report | CRYPTREC EX-0104-2000P2 (No.0104) |
||
2000 | Detailed Evaluation Report on ECAES | Tatsuaki Okamoto, Atsushi Fujioka |
CRYPTREC EX-0105-2000 (No.0105) |
2000 | Detailed Evaluation Report on Security (HIME-1) | - | CRYPTREC EX-0106-2000 (No.0106) |
2000 | Detailed Evaluation Report on Security of HIME-2 | - | CRYPTREC EX-0107-2000 (No.0107) |
2000 | 1. Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "ECDHS (Elliptic Curve Diffie-Hellman Scheme) in SEC1" | - | CRYPTREC EX-0108-2000P1 (No.0108) |
2. Summary of Report | CRYPTREC EX-0108-2000P2 (No.0108) |
||
2000 | Detailed Evaluation Report on Cryptographic Algorithm PSEC | - | CRYPTREC EX-0109-2000 (No.0109) |
2000 | Detailed Evaluation Report on Avalanche Test | - | CRYPTREC EX-0110-2000 (No.0110) |
2000 | Detailed Evaluation Report on Security of Common Key Block Cipher CIPHERUNICORN-E | Takeshi Shimoyama | CRYPTREC EX-0111-2000 (No.0111) |
2000 | Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of CIPHERUNICORN-E | Masayuki Kanda | CRYPTREC EX-0112-2000P1 (No.0112) |
CRYPTREC EX-0112-2000P2 (No.0112) |
|||
2000 | 1.Higher-Order Differentialof CRYPTREC Submission Encryption and Security against Interpolation Attacks | Toshinobu Kaneko | CRYPTREC EX-0113-2000P1 (No.0113) |
2.Appendix A: CIPHERUNICORN-E | CRYPTREC EX-0113-2000P2 (No.0113) |
||
3.Appendix B: MISTY1 | CRYPTREC EX-0113-2000P3 (No.0113) |
||
4.Appendix C: FEAL-NX | CRYPTREC EX-0113-2000P4 (No.0113) |
||
5.Appendix D: Hierocrypt(-L1,3) | CRYPTREC EX-0113-2000P5 (No.0113) |
||
6.Appendix E: CIPHERUNICORN-A | CRYPTREC EX-0113-2000P6 (No.0113) |
||
7.Appendix F: Camellia | CRYPTREC EX-0113-2000P7 (No.0113) |
||
8.Appendix G: RC6 | CRYPTREC EX-0113-2000P8 (No.0113) |
||
9.Appendix H: SC2000 | CRYPTREC EX-0113-2000P9 (No.0113) |
||
10.Appendix I: MARS | CRYPTREC EX-0113-2000P10 (No.0113) |
||
11.Appendix J: Linear Sum Attack Resistance of Encryption subject to Detailed Evaluation | CRYPTREC EX-0113-2000P11 (No.0113) |
||
2000 | 1.Detailed Evaluaiton (HW Implementation Evaluation) Report on Cryptographic Algorithm "Hierocrypt-L1" | - | CRYPTREC EX-0114-2000P1 (No.0114) |
2.Summary of Report | CRYPTREC EX-0114-2000P2 (No.0114) |
||
2000 | Detailed Evaluation Report on Security of Hierocrypt-L1 | - | CRYPTREC EX-0115-2000 (No.0115) |
2000 | Maximum Linear/Differential Probability and Maximum Linear/ Probability Differential Characteristic of Hierocrypt-L1 | Shiho Moriai | CRYPTREC EX-0116-2000P1 (No.0116) |
CRYPTREC EX-0116-2000P2 (No.0116) |
|||
2000 | Detailed Evaluation of Security of MISTY1 | Kenji Ohkuma, Fumihiko Sano |
CRYPTREC EX-0117-2000P1 (No.0117) |
CRYPTREC EX-0117-2000P2 (No.0117) |
|||
2000 | Evaluation Report on MISTY1 H/W Implementation | Masahiko Motoyama, Masue Shiba |
CRYPTREC EX-0118-2000 (No.0118) |
2000 | Probability Maximum Differential/Linear Probability of MISTY | Masayuki Kanda | CRYPTREC EX-0119-2000 (No.0119) |
2000 | On Triple DES | - | CRYPTREC EX-0120-2000 (No.0120) |
2000 | On Rijndael | - | CRYPTREC EX-0121-2000 (No.0121) |
2000 | Outline of Detailed Evaluation/Detailed Evaluation Report on Evaluation of Camellia Attack | - | CRYPTREC EX-0122-2000P1 (No.0122) |
CRYPTREC EX-0122-2000P2 (No.0122) |
|||
2000 | Evaluation Report on CAMELLIA H/W Implementation | Masahiko Motoyama, Masue Shiba |
CRYPTREC EX-0123-2000 (No.0123) |
2000 | Maximum Differential Characteristic Probability and Maximum Linear Characteristic Probability of Camellia | Masayuki Kanda | CRYPTREC EX-0124-2000P1 (No.0124) |
2000 | CRYPTREC EX-0124-2000P2 (No.0124) |
||
2000 | Detailed Evaluation Report Concerning Security of Common Key Block Cipher CIPHERUNICORN-A | Takeshi Shimoyama | CRYPTREC EX-0125-2000 (No.0125) |
2000 | Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of CIPHERUNICORN-A | Masayuki Kanda | CRYPTREC EX-0126-2000P1 (No.0126) |
CRYPTREC EX-0126-2000P2 (No.0126) |
|||
2000 | 1.Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "Hierocrypt-3" | - | CRYPTREC EX-0127-2000P1 (No.0127) |
2.Summary of Report | CRYPTREC EX-0127-2000P2 (No.0127) |
||
2000 | Detailed Evaluation Report on Security of Hierocrypt-3 | - | CRYPTREC EX-0128-2000 (No.0128) |
2000 | Maximum Linear/Differential Probability and Maximum Linear/Probability Differential Characteristic of Hierocrypt-3 | Shiho Moriai | CRYPTREC EX-0129-2000P1 (No.0129) |
CRYPTREC EX-0129-2000P2 (No.0129) |
Investigation Reports on Cryptographic Algorithms and Related Technologies in FY 2002(No.0130-0157)
FY | Title | Authors | Document ID |
---|---|---|---|
2000 | 1. Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "RC6" | - | CRYPTREC EX-0130-2000P1 (No.0130) |
2.Summary of Report | CRYPTREC EX-0130-2000P2 (No.0130) |
||
2000 | 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "RC6" | - | CRYPTREC EX-0131-2000P1 (No.0131) |
2.Summary of Report | CRYPTREC EX-0131-2000P2 (No.0131) |
||
2000 | Detailed Evaluation of Cryptographic Algorithm Maximum Linear/Differential Probability and Maximum Linear/ Probability Differential Characteristic of 128bit-Block Cipher RC6 | Kazumaro Aoki | CRYPTREC EX-0132-2000 (No.0132) |
2000 | Detailed Evaluation of Security of SC2000 | Kenji Ohkuma, Fumihiko Sano |
CRYPTREC EX-0133-2000P1 (No.0133) |
CRYPTREC EX-0133-2000P2 (No.0133) |
|||
2000 | Detailed Evaluation of Cryptographic Algorithm Maximum Linear/Differential Probability and Maximum Linear/Differential Characteristic Probability of 128bit-Block Cipher SC2000 | Kazumaro Aoki | CRYPTREC EX-0134-2000 (No.0134) |
2000 | Outline of H/W Implementation Evaluation (MULTI-S01)/Detailed Evaluation Report MULTI-S01H/W Implementation Evaluation | - | CRYPTREC EX-0135-2000P1 (No.0135) |
CRYPTREC EX-0135-2000P2 (No.0135) |
|||
2000 | 1.Detailed Evaluation Report on Cryptographic Algorithm Stream Cipher MULTI-S01 | - | CRYPTREC EX-0136-2000P1 (No.0136) |
2.Data used for Evaluation of MULTI-S01 Encryption | CRYPTREC EX-0136-2000P2 (No.0136) |
||
3.Evaluation of Stream Cipher Long-Period Linkage Test MULTI-S01 | CRYPTREC EX-0136-2000P3 (No.0136) |
||
4.Evaluation of Stream Cipher Linkage Test MULTI-S01 | CRYPTREC EX-0136-2000P4 (No.0136) |
||
5.Evaluation of Stream Cipher 0/1 Balance Test MULTI-S01 | CRYPTREC EX-0136-2000P5 (No.0136) |
||
6.Evaluation of Stream Cipher Mutual Information Test MULTI-S01 | CRYPTREC EX-0136-2000P6 (No.0136) |
||
7.Evaluation of Stream Cipher Linear Complexity Test MULTI-S01 | CRYPTREC EX-0136-2000P7 (No.0136) |
||
8.Evaluation of Stream Cipher Uniformity Test MULTI-S01 | CRYPTREC EX-0136-2000P8 (No.0136) |
||
2000 | 1.Detailed Evaluation Report on Cryptographic Algorithm Pseudo Random Number Generator PANAMA (MULTI-S01 Inside) | - | CRYPTREC EX-0137-2000P1 (No.0137) |
2.Type of Key Used for Evaluation of PANAMA | CRYPTREC EX-0137-2000P2 (No.0137) |
||
3.Evaluation of Pseudo Random Number Generator 0/1 Balance Test for PANAMA (MULTI-S01) | CRYPTREC EX-0137-2000P3 (No.0137) |
||
4.Evaluation of Pseudo Random Number Generator Avalanche Test for PANAMA (MULTI-S01) | CRYPTREC EX-0137-2000P4 (No.0137) |
||
5.Evaluation of Pseudo Random Number Generator Uniformity Test for PANAMA (MULTI-S01) | CRYPTREC EX-0137-2000P5 (No.0137) |
||
6.Evaluation of Pseudo Random Number Generator Long-Period Linkage Test for PANAMA (MULTI-S01) | CRYPTREC EX-0137-2000P6 (No.0137) |
||
7.Evaluation of Pseudo Random Number Generator Linkage Test for PANAMA (MULTI-S01) | CRYPTREC EX-0137-2000P7 (No.0137) |
||
8.Evaluation of Pseudo Random Number Generator Linear Complexity Test for PANAMA (MULTI-S01) | CRYPTREC EX-0137-2000P8 (No.0137) |
||
2000 | Detailed Evaluation of Cryptographic Algorithms | Satoshi Uehara | CRYPTREC EX-0138-2000P1 (No.0138) |
CRYPTREC EX-0138-2000P2 (No.0138) |
|||
CRYPTREC EX-0138-2000P3 (No.0138) |
|||
CRYPTREC EX-0138-2000P4 (No.0138) |
|||
CRYPTREC EX-0138-2000P5 (No.0138) |
|||
CRYPTREC EX-0138-2000P6 (No.0138) |
|||
CRYPTREC EX-0138-2000P7 (No.0138) |
|||
CRYPTREC EX-0138-2000P8 (No.0138) |
|||
CRYPTREC EX-0138-2000P9 (No.0138) |
|||
CRYPTREC EX-0138-2000P10 (No.0138) |
|||
CRYPTREC EX-0138-2000P11 (No.0138) |
|||
CRYPTREC EX-0138-2000P12 (No.0138) |
|||
2000 | Other Cryptographic Algorithms which need to be evaluated Investigation on Hash Functions |
LEE Seon Young | CRYPTREC EX-0139-2000 (No.0139) |
2000 | Pseudo random Number Generator with SHA-1 | - | CRYPTREC EX-0140-2000 (No.0140) |
2000 | Evaluation Report on ACE Encryption Attack/General | - | CRYPTREC EX-0141-2000P1 (No.0141) |
CRYPTREC EX-0141-2000P2 (No.0141) |
|||
2000 | Detailed Evaluation Report on MY-ELLY ECMR-XXX-h | - | CRYPTREC EX-0142-2000 (No.0142) |
2000 | Evaluation Report on ACE Signature Attack/General | - | CRYPTREC EX-0143-2000P1 (No.0143) |
CRYPTREC EX-0143-2000P2 (No.0143) |
|||
2000 | 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "ECMQVS (Elliptic Curve MQV Scheme) in SEC1" | - | CRYPTREC EX-0144-2000P1 (No.0144) |
2.Summary of Report | CRYPTREC EX-0144-2000P2 (No.0144) |
||
2000 | Outline of Detailed Evaluation of HDEF-ECDH/Detailed Evaluation Report on HDEF-ECDH | - | CRYPTREC EX-0145-2000P1 (No.0145) |
CRYPTREC EX-0145-2000P2 (No.0145) |
|||
2000 | Detailed Evaluation Report on ESIGN Authentication | Atsushi Shimbo , Hideo Shimizu, Koji Okada, Akito Niwa |
CRYPTREC EX-0146-2000 (No.0146) |
2000 | Outline of Detailed Evaluation of FEAL-NX/Detailed Evaluation Report on Cryptanalysis against FEAL-NX | - | CRYPTREC EX-0147-2000P1 (No.0147) |
CRYPTREC EX-0147-2000P2 (No.0147) |
|||
2000 | Outline of Detailed Evaluation of FEAL-NX/Detailed Evaluation Report on Cryptanalysis against FEAL-NX | - | CRYPTREC EX-0148-2000P1 (No.0148) |
CRYPTREC EX-0148-2000P2 (No.0148) |
|||
2000 | Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "FEAL-NX" "FEAL-NX"/Summary of Report | Masayuki Kanda | CRYPTREC EX-0149-2000P1 (No.0149) |
CRYPTREC EX-0149-2000P2 (No.0149) |
|||
2000 | 1.Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of FEAL | - | CRYPTREC EX-0150-2000P1 (No.0150) |
2000 | 2.Summary of Report | CRYPTREC EX-0150-2000P2 (No.0150) |
|
2000 | 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "MARS" | - | CRYPTREC EX-0151-2000P1 (No.0151) |
2000 | 2.Summary of Report | CRYPTREC EX-0151-2000P2 (No.0151) |
|
2000 | Probability Maximum Differential/Linear Characteristics of MARS | Shiho Moriai | CRYPTREC EX-0152-2000P1 (No.0152) |
CRYPTREC EX-0152-2000P2 (No.0152) |
|||
2000 | Outline of H/W Implementation Evaluation (TOYOCRYPT-HS1)/Detailed Evaluation Report Evaluation of TOYOCRYPT-HS1 H/W Implementation | - | CRYPTREC EX-0153-2000P1 (No.0153) |
CRYPTREC EX-0153-2000P2 (No.0153) |
|||
2000 | Evaluation Report on TOYOCRYPT-HS1/Gist of Evaluation | - | CRYPTREC EX-0154-2000P1 (No.0154) |
CRYPTREC EX-0154-2000P2 (No.0154) |
|||
2000 | 1.Detailed Evaluation Report on Cryptographic Algorithm Stream Cipher TOYOCRYPT-HS1 | - | CRYPTREC EX-0155-2000P1 (No.0155) |
2000 | 2.Type of Keys Used for Evaluation of TOYOCRYPT Series | CRYPTREC EX-0155-2000P2 (No.0155) |
|
2000 | 3.Evaluation of Stream Cipher Mutual Information Test TOYOCRYPT-HS1 | CRYPTREC EX-0155-2000P3 (No.0155) |
|
2000 | Evaluation Report on TOYOCRYPT-HR1/Gist of Evaluation | - | CRYPTREC EX-0156-2000P1 (No.0156) |
CRYPTREC EX-0156-2000P2 (No.0156) |
|||
2000 | 1.Detailed Evaluation Report on Cryptographic Algorithm Pseudo random Number Generator TOYOCRYPT-HR1 | - | CRYPTREC EX-0157-2000P1 (No.0157) |
2.Type of Key Used for Evaluation of TOYOCRYPT Series | CRYPTREC EX-0157-2000P2 (No.0157) |
||
3.Evaluation of Pseudo random Number Generator Long-Period Linkage Test for TOYOCRYPT-HR1 | CRYPTREC EX-0157-2000P3 (No.0157) |
||
4.Evaluation of Pseudo Random Number Generator 0/1 Balance Test for TOYOCRYPT-HR1 | CRYPTREC EX-0157-2000P4 (No.0157) |
||
5.Evaluation of Pseudo Random Number Generator Linear Complexity Test for TOYOCRYPT-HR1 | CRYPTREC EX-0157-2000P5 (No.0157) |
||
6.Evaluation of Pseudo Random Number Generator Avalanche Test for TOYOCRYPT-HR1 | CRYPTREC EX-0157-2000P6 (No.0157) |
||
7.Evaluation of Pseudo Random Number Generator Uniformity Test for TOYOCRYPT-HR1 | CRYPTREC EX-0157-2000P7 (No.0157) |
||
8.Evaluation of Pseudo random Number Generator Linkage Test for TOYOCRYPT-HR1 | CRYPTREC EX-0157-2000P8 (No.0157) |
List of Cryptographic Algorithms and Related Techniques Evaluation Reports in FY2002 (Overseas)
FY | Classification | Title | Authors | Document ID |
---|---|---|---|---|
2001 | DSA | DSA-Security Evaluation of the Signature Scheme and Primitive- | Jean-Jacques Quisquater | CRYPTREC EX-1001-2001 (No.1001) |
2001 | DSA | Evaluation Report on DSA | Serge Vaundenay | CRYPTREC EX-1002-2001 (No.1002) |
2001 | DSA | The Digital Signature Algorithm (DSA) | Johannes Buchmann | CRYPTREC EX-1003-2001 (No.1003) |
2001 | ECDSA | Evaluation Report on the ECDSA signature scheme | Jaques Stern | CRYPTREC EX-1004-2001 (No.1004) |
2001 | ECDSA | Evaluation Report on ECDSA | Serge Vaudenay | CRYPTREC EX-1005-2001 (No.1005) |
2001 | ECDSA | Security Level of Cryptography-ECDSA | Dan Boneh and Phillip Rogaway | CRYPTREC EX-1006-2001 (No.1006) |
2001 | ESIGN | A review of the ESIGN digital signature standard | Nicholas Howgrave-Graham | CRYPTREC EX-1007-2001 (No.1007) |
2001 | ESIGN | Approximate l -th roots moduro n | Brigitte Vallee | CRYPTREC EX-1008-2001 (No.1008) |
2001 | ESIGN | Evaluation Report on the ESIGN signature scheme | Jaques Stern | CRYPTREC EX-1009-2001 (No.1009) |
2001 | ESIGN | Security of N=P2Q in ESIGN/ The size of the exponent in ESIGN | Marc Girault and Jean-Francois Misarsky | CRYPTREC EX-1010-2001 (No.1010) |
2001 | RSA-OAEP/RSA Signature | Evaluation of Security Level of Cryptography:RSA-OAEP, RSA-PSS,RSA Signature | Alfred Menezes | CRYPTREC EX-1011-2001 (No.1011) |
2001 | RSA-OAEP/RSA Signature | Evaluation Report on the RSA-OAEP encryption scheme | Jaques Stern | CRYPTREC EX-1012-2001 (No.1012) |
2002 | RSA-PKCS | Evaluation of Cryptographic Techniques | Jean-Sebastien Coron | CRYPTREC EX-1013-2002 (No.1013) |
2002 | RSA-PKCS | Evaluation of Security Level of Cryptography:RSA Signature Schemes (PKCS#1 v1.5,ANSI X9.31,ISO9796) |
Alfred Menezes | CRYPTREC EX-1014-2002 (No.1014) |
2002 | ECIES | ECIES-Security Evaluation of the Encryption Scheme and Primitives- | Jean-Jacques Quisquater | CRYPTREC EX-1015-2002 (No.1015) |
2002 | ECIES | Evaluation Report on the ECIES Cryptosystem | Jaques Stern | CRYPTREC EX-1016-2002 (No.1016) |
2002 | HIME (R) | Evaluation of Security Level of Cryptography:The HIME (R) Encryption Scheme | Alfred Menezes | CRYPTREC EX-1017-2002 (No.1017) |
2002 | HIME (R) | Evaluation Report on the HIME (R) Cryptosystem | Jaques Stern | CRYPTREC EX-1018-2002 (No.1018) |
2002 | HIME (R) | Evaluation Report of HIME (R) | - | CRYPTREC EX-1019-2001 (No.1019) |
2001 | PSEC2 | Evaluation of Security Level of Cryptography:The Revised Version of PSEC-2 (PSEC-KEM) | Alfred Menezes | CRYPTREC EX-1020-2001 (No.1020) |
2001 | EPOC2 | Evaluation of Security Level of Cryptography: The Revised Version of EPOC-2 | Alfred Menzes | CRYPTREC EX-1021-2001 (No.1021) |
2001 | EPOC2 | EPOC-2 Security Evaluation of the Encryption Scheme | Jean-Jacques Quisquater | CRYPTREC EX-1022-2001 (No.1022) |
2001 | Factoring Problem | Evaluation Report on the Factoring Problem | Jaques Stern | CRYPTREC EX-1023-2001 (No.1023) |
2001 | Factoring Problem | Security Level of Cryptography-Integer Factoring Problem (Factoring N=p2q) | Dan Boneh | CRYPTREC EX-1024-2001 (No.1024) |
2001 | Factoring Problem | Report on Integer Factorization | Rene Peralta | CRYPTREC EX-1025-2001 (No.1025) |
2001 | Discrete Logarithm Problem over Finite Fields | Computing discrete logarithms in the multiplicative group of a finite field | Johannes Buchmann | CRYPTREC EX-1026-2002 (No.1026) |
2001 | Discrete Logarithm Problem over Finite Fields | Evaluation Report on the Discrete Logarithm Problem over finite fields | Jaques Stern | CRYPTREC EX-1027-2001 (No.1027) |
2001 | Elliptic Curve Discrete Logarithm Preblem | Evaluation of Security Level of Cryptography:The Elliptic Curve Discrete Logarithm Problem (ECDLP) | Alfred Menezes | CRYPTREC EX-1028-2001 (No.1028) |
2001 | Elliptic Curve Discrete Logarithm Preblem | Evaluation Report for CRYPTREC:Security Level of Cryptography {ECDLP Mathematical Problem | S.D.Galbraith and N.P.Smart | CRYPTREC EX-1029-2001 (No.1029) |
2002 | Generation Methods of Elliptic Curves | Generartion Methods of Elliptic Curves | Harald Baier and Johannes Buchmann | CRYPTREC EX-1030-2002 (No.1030) |
2001 | CIPHERUNICORN-E | A Crptographic Review of Cipherunicorn E | Matt Robshaw | CRYPTREC EX-1031-2001 (No.1031) |
2001 | CIPHERUNICORN-E | An Evaluation of the Security of CipherUnicorn-E Against Certain Attacks | David Wagner | CRYPTREC EX-1032-2001 (No.1032) |
2001 | CIPHERUNICORN-A | A Cryptographic Review of Cipherunicorn A | Matt Robshaw | CRYPTREC EX-1033-2001 (No.1033) |
2001 | CIPHERUNICORN-A | An Evaluation of the Security of CipherUnicorn-A Against Certain Attacks | David Wagner | CRYPTREC EX-1034-2001 (No.1034) |
2002 | MUGI | Evaluation of the MUGI Pseudo-Random Number Generator | Ed Dawson, Gary Carter, Helen Gustafson, Matt Henricksen, Bill Millan and Leonie Simpson | CRYPTREC EX-1035-2002 (No.1035) |
2002 | MUGI | Report on Security Evaluation of MUGI Stream Cipher | Miorag Mihaljevic | CRYPTREC EX-1036-2002 (No.1036) |
2002 | MUGI | Security Evaluation of MUGI | Jovan Golic | CRYPTREC EX-1037-2002 (No.1037) |
2001 | MULTI-S01 | Security Level of Cryptography-Security evaluation (especially in mode part)for the stream cipher MULTI-S01 | Phillip Rogaway | CRYPTREC EX-1038-2001 (No.1038) |
2001 | PANAMA1 | An Evaluation of the Security of MULTI-S01 | David Wagner | CRYPTREC EX-1039-2001 (No.1039) |
2001 | PANAMA1 | Report on Security Evaluation of PANAMA Stream Cipher | Miorag Mihaljevic | CRYPTREC EX-1040-2001 (No.1040) |
2001 | SEED | Analysis of SEED | - | CRYPTREC EX-1041-2001 (No.1041) |
2001 | RC2 | Analysis of RC2 | - | CRYPTREC EX-1042-2001 (No.1042) |
2002 | RC4 | Evaluation of RC4 Stream Cipher | Ed Dawson, Helen Gustafson, Matt Henricksen and Bill Millan | CRYPTREC EX-1043-2002 (No.1043) |
2002 | RC4 | Report on Security Evaluation of RC4 Stream Cipher | Miorag Mihaljevic | CRYPTREC EX-1044-2002 (No.1044) |
2001 | SHA256 | Evaluation Report Security Level of Cryptography-SHA-256 | Helena Handschuh and Henri Gilbert | CRYPTREC EX-1045-2001 (No.1045) |
2001 | SHA384/512 | Evaluation Report Security Level of Cryptography-SHA-384 and SHA-512 | Henri Gilbert and Helena Handschuh | CRYPTREC EX-1046-2001 (No.1046) |
2002 | Survey of Side channel attacks | Side channel attacks | Jean-Jacques Quisquater and Francois Koeune | CRYPTREC EX-1047-2002 (No.1047) |
2000 | ACE Sign | Evaluation of the Security of ACE Sign | Johannes Buchmann | CRYPTREC EX-1048-2000 (No.1048) |
2000 | ACE Sign | Evaluation of Security Level of Cryptography:ACE Signature Scheme | Alfred Menezes et al. | CRYPTREC EX-1049-2000 (No.1049) |
2000 | ECDSA in SEC1 | Evaluation of the Security of ECDSA | Johannes Buchmann | CRYPTREC EX-1050-2000 (No.1050) |
2000 | ECDSA in SEC1 | Evaluation of Security Level of Cryptography:ECDSA Signature Scheme | Alfred Menezes et al. | CRYPTREC EX-1051-2000 (No.1051) |
2000 | ESIGN | Evaluation of the Security of ESIGN | Johannes Buchmann | CRYPTREC EX-1052-2000 (No.1052) |
2000 | ESIGN | Evaluation of Security Level of Cryptography:ESIGN Signature Scheme | ALfred Menezes et al. | CRYPTREC EX-1053-2000 (No.1053) |
2000 | MY-ELLY ECMR-XXX-h |
Evaluation of the Security of My-Ellty ECMR | Johannes Buchmann | CRYPTREC EX-1054-2000 (No.1054) |
2000 | MY-ELLY ECMR-XXX-h |
Evaluation of Security Level of Cryptography:MY-ELLY Signature Scheme | Alfred Menezes et al. | CRYPTREC EX-1055-2000 (No.1055) |
2000 | ACE Encrypt | Evaluation Report on the ACE Encrypt Cryptosystem -Summary of Evaluation |
Jaques Stern | CRYPTREC EX-1056-2000 (No.1056) |
2000 | ACE Encrypt | Security Level of Cryptography-ACE | - | CRYPTREC EX-1057-2000 (No.1057) |
2000 | ECAES in SEC1 | Evaluation Report on the ECAES Cryptosystem. Summary of Evaluation |
Jaques Stern | CRYPTREC EX-1058-2000 (No.1058) |
2000 | ECAES in SEC1 | Security Level of Cryptography-ECAES | - | CRYPTREC EX-1059-2000 (No.1059) |
2000 | EPOC | Evaluation Report on the EPOC Cryptosystem. Summary of Evaluation |
Jaques Stern | CRYPTREC EX-1060-2000 (No.1060) |
2000 | EPOC | Security Level of Cryptography-EPOC | - | CRYPTREC EX-1061-2000 (No.1061) |
2000 | HIME-2 | Evaluation Report on the HIME-2 Cryptosystem | Jaques Stern | CRYPTREC EX-1062-2000 (No.1062) |
2000 | HIME-2 | Security Level of Cryptography:HIME-2 | - | CRYPTREC EX-1063-2000 (No.1063) |
2000 | PSEC | Evaluation Report on the PSEC Cryptosystem | Jaques Stern | CRYPTREC EX-1064-2000 (No.1064) |
2000 | PSEC | Security Level of Cryptography-PSEC | - | CRYPTREC EX-1065-2000 (No.1065) |
2000 | ECDH in SEC1 | Evaluation Report on the ECDHS Cryptosystem | Jaques Stern | CRYPTREC EX-1066-2000 (No.1066) |
2000 | ECDH in SEC1 | Evaluation of Security Level of Cryptography ECDHS | Phillip Rogaway, Mihir Bellare and Dan Boneh | CRYPTREC EX-1067-2000 (No.1067) |
2000 | ECMQV in SEC1 | Evaluation Report on the ECMQVS Cryptosystem | Jaques Stern | CRYPTREC EX-1068-2000 (No.1068) |
2000 | ECMQV in SEC1 | Evaluation of Security Level of Cryptography ECMQVS (from SEC1) | Phillip Rogaway, Mihir Bellare and Dan Boneh | CRYPTREC EX-1069-2000 (No.1069) |
2000 | HDEF-ECDH | Evaluation Report on the HDEF-ECDH Cryptosystem. | Jaques Stern | CRYPTREC EX-1070-2000 (No.1070) |
2000 | HDEF-ECDH | Evaluation of Security Level of Cryptography HDEF-ECDH | Phillip Rogaway, Mihir Bellare and Dan Boneh | CRYPTREC EX-1071-2000 (No.1071) |
2000 | HIME-1 | Evaluation Report on the HIME-1 Cryptosystem | Jaques Stern | CRYPTREC EX-1072-2000 (No.1072) |
2000 | SUMMERY | Summary of Evaluation | Jaques Stern | CRYPTREC EX-1073-2000 (No.1073) |
2000 | SUMMERY | Evaluation of Security Level of Cryptography Key-Sharing Schemes (Summary) | Phillip Rogaway | CRYPTREC EX-1074-2000 (No.1074) |
2000 | HIME-1 | Evaluation of Security Level of Cryptography HIME-1 | Dan Boneh, | CRYPTREC EX-1075-2000 (No.1075) |
2000 | ESIGN | Evaluation of the Security of ESIGN Identification | Johannes Buchmann | CRYPTREC EX-1076-2000 (No.1076) |
2000 | ESIGN | Evaluation of Security Level of Cryptography:ESIGN Identification Scheme | Alfred Menezes et al. | CRYPTREC EX-1077-2000 (No.1077) |
2000 | CIPHERUNICORN-E | Analysis of four 64-bit Symmetric Ciphers | Serge Vaudenay | CRYPTREC EX-1078-2000 (No.1078) |
2000 | FEAL-NX | Analysis of four 64-bit Symmetric Ciphers | Serge Vaudenay | CRYPTREC EX-1079-2000 (No.1079) |
2000 | Hierocrypt-L1 | Analysis of four 64-bit Symmetric Ciphers | Serge Vaudenay | CRYPTREC EX-1080-2000 (No.1080) |
2000 | MISTY1 | Analysis of four 64-bit Symmetric Ciphers (Chapter 4) | Serge Vaudenay | CRYPTREC EX-1081-2000 (No.1081) |
2000 | Camellia | Analysis of Camellia | - | CRYPTREC EX-1082-2000 (No.1082) |
2000 | CIPHERUNICORN-A | Analysis of Cipherunicorn-A | - | CRYPTREC EX-1083-2000 (No.1083) |
2000 | Hierocrypt-3 | Analysis of Hierocrypt-3 | - | CRYPTREC EX-1084-2000 (No.1084) |
2000 | MARS | Analysis of MARS | - | CRYPTREC EX-1085-2000 (No.1085) |
2000 | RC6 | Analysis of RC6 | - | CRYPTREC EX-1086-2000 (No.1086) |
2000 | SC2000 | Analysis of SC2000 | - | CRYPTREC EX-1087-2000 (No.1087) |
2000 | MULTI-S01 | Evaluation of MULTI-S01 | Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan and Gray Carter | CRYPTREC EX-1088-2000 (No.1088) |
2000 | TOYOCRYPT-HS1 | Evaluation of TOYOCRYPT-HS1 | Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan and Leonie Sipmson | CRYPTREC EX-1089-2000 (No.1089) |
2000 | TOYOCRYPTR-HR1 | Evaluation of TOYOCRYPT-HR1 | Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan and Leonie Sipmson | CRYPTREC EX-1090-2000 (No.1090) |