{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00077952","sets":["6164:6165:6462:6551"]},"path":["6551"],"owner":"10","recid":"77952","title":["パラメータ固定ハッシュ関数の理論的安全性評価に関する一考察 ― 関数の近似可能性の観点から ―"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-10-12"},"_buckets":{"deposit":"fa467d4a-50a3-4fd8-83ee-41aa827e083e"},"_deposit":{"id":"77952","pid":{"type":"depid","value":"77952","revision_id":0},"owners":[10],"status":"published","created_by":10},"item_title":"パラメータ固定ハッシュ関数の理論的安全性評価に関する一考察 ― 関数の近似可能性の観点から ―","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"パラメータ固定ハッシュ関数の理論的安全性評価に関する一考察 ― 関数の近似可能性の観点から ―"},{"subitem_title":"On security evaluation of hash functions from a viewpoint of function approximation","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"共通鍵暗号・ハッシュ関数(2)","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2011-10-12","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"産業技術総合研究所"},{"subitem_text_value":"京都大学"},{"subitem_text_value":"山口大学"},{"subitem_text_value":"東京大学/JST CREST"},{"subitem_text_value":"京都大学"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"National Institute of Advanced Industrial Science and Technology (AIST)","subitem_text_language":"en"},{"subitem_text_value":"Kyoto University","subitem_text_language":"en"},{"subitem_text_value":"Yamaguchi University","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo / Japan Science and Technology Agency (JST), CREST","subitem_text_language":"en"},{"subitem_text_value":"Kyoto University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/77952/files/IPSJCSS2011057.pdf"},"date":[{"dateType":"Available","dateValue":"2012-10-12"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2011057.pdf","filesize":[{"value":"154.7 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"44"},{"tax":["include_tax"],"price":"30000","billingrole":"5"}],"accessrole":"open_date","version_id":"c691ce8a-7203-4114-9c74-ae40ef24607e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2011 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"縫田, 光司"},{"creatorName":"阿部, 拓郎"},{"creatorName":"鍛冶, 静雄"},{"creatorName":"沼田, 泰英"},{"creatorName":"前野, 俊昭"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Koji, Nuida","creatorNameLang":"en"},{"creatorName":"Takuro, Abe","creatorNameLang":"en"},{"creatorName":"Shizuo, Kaji","creatorNameLang":"en"},{"creatorName":"Yasuhide, Numata","creatorNameLang":"en"},{"creatorName":"Toshiaki, Maeno","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"SHA-1やMD5に代表される,パラメータを具体的に固定したハッシュ関数の衝突耐性の解析は,実社会における情報セキュリティ技術の安全性保証のために重要度の高い問題であるが,その理論的な取り扱いは極めて困難であることが以前から知られていた.本研究では,パラメータ固定型ハッシュ関数の衝突耐性に関する理論的解析手法の確立に向けた端緒とすべく,ハッシュ関数の衝突耐性解析に関する従来手法のエッセンスを抽出する形で新たな数学的問題の定式化を行い,その問題について考察を行った.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Security evaluation of hash functions with fixed parameters, such as SHA-1 and MD5, is a significant problem in real-life use of information security technology, but its theoretical treatment has been regarded as highly difficult. In this talk, we propose a new mathematical problem that is motivated from and relevant to abstraction of existing cryptanalytic techniques for hash functions, and show some preliminary observation of this problem.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"336","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2011 論文集"}],"bibliographicPageStart":"331","bibliographicIssueDates":{"bibliographicIssueDate":"2011-10-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2011"}]},"relation_version_is_last":true,"weko_creator_id":"10"},"updated":"2025-01-21T20:41:49.235732+00:00","created":"2025-01-18T23:33:25.862226+00:00","links":{},"id":77952}