<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-22T18:26:49Z</responseDate>
  <request verb="GetRecord" metadataPrefix="oai_dc" identifier="oai:ipsj.ixsq.nii.ac.jp:00212461">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00212461</identifier>
        <datestamp>2025-01-19T17:30:47Z</datestamp>
        <setSpec>1164:4061:10490:10633</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>軽量認証暗号SPARKLEの耐タンパ性評価</dc:title>
          <dc:title>Tamper Resistance Evaluation of A Lightweight Authenticated Encryption SPARKLE</dc:title>
          <dc:creator>野崎, 佑典</dc:creator>
          <dc:creator>吉川, 雅弥</dc:creator>
          <dc:creator>Yusuke, Nozaki</dc:creator>
          <dc:creator>Masaya, Yoshikawa</dc:creator>
          <dc:subject>評価</dc:subject>
          <dc:description>近年，小回路規模や低遅延，低消費電力で利用可能な軽量暗号が注目されている．また，現在 NIST では次世代の軽量暗号の標準規格を決めるプロジェクト Lightweight Cryptography（LWC）が実施されている．本研究で対象とする SPARKLE は NIST の LWC で Finalist に選ばれた軽量暗号である．一方で，暗号アルゴリズムの安全性に関して，サイドチャネル攻撃などの実装攻撃に対する耐タンパ性を検証することは非常に重要である．本研究では，SPARKLE を対象に，耐タンパ性に関する検討を行う．</dc:description>
          <dc:description>In recent years, lightweight block ciphers, which can be utilized in small circuit size, low latency, and low power, have attracted attention. In addition, NIST takes a Lightweight Cryptography (LWC) which decides the next-generation standard of lightweight cipher. The lightweight cipher Sparkle is one of the finalists in LWC. On the other hand, it is important to verify the tamper resistance against side-channel attacks. Therefore, this study evaluates the tamper resistance of a lightweight cipher Sparkle.</dc:description>
          <dc:description>technical report</dc:description>
          <dc:publisher>情報処理学会</dc:publisher>
          <dc:date>2021-08-26</dc:date>
          <dc:format>application/pdf</dc:format>
          <dc:identifier>研究報告ユビキタスコンピューティングシステム（UBI）</dc:identifier>
          <dc:identifier>16</dc:identifier>
          <dc:identifier>2021-UBI-71</dc:identifier>
          <dc:identifier>1</dc:identifier>
          <dc:identifier>4</dc:identifier>
          <dc:identifier>2188-8698</dc:identifier>
          <dc:identifier>AA11838947</dc:identifier>
          <dc:identifier>https://ipsj.ixsq.nii.ac.jp/record/212461/files/IPSJ-UBI21071016.pdf</dc:identifier>
          <dc:language>jpn</dc:language>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
