External Evaluation Reports

To assure information security of e-Government in Japan, and to realize fair and adequate evaluation of cryptographic techniques, CRYPTREC commisions the research and investigation to experts in cryptographic research besides the committee members, as a part of committee activities. The targets of research and investigations have been selected by the Cryptographic Technique Evaluation Committee up to FY 2002, by the Cryptographic Technique Monitoring Subcommittee up to FY 2006, and by the Cryptographic Scheme Committee in and after FY 2010. The reports are publicized on this website to facilitate cryptographic research.


* The linked documents are written in Japanese, except for those from overseas.

Investigation Reports on Cryptographic Techniques in FY 2017

FY Title Authors PDF Files
2017 Review and Security Evaluation of ChaCha20-Poly1305 and Poly1305 Tetsu Iwata CRYPTREC EX-2701-2017
(No.2701)
2017 Performance Evaluation of ChaCha20-Poly1305 Lepidum Co. Ltd. CRYPTREC EX-2702-2017
(No.2702)

Investigation Reports on Cryptographic Techniques in FY 2016

FY Title Authors PDF Files
2016 Security Analysis of ChaCha20-Poly1305 AEAD KDDI Research, Inc. CRYPTREC EX-2601-2016
(No.2601)
2016 Index Calculus Algorithms for ECDLP§1 Naoyuki Shinohara,
Masayuki Noro,
Kazuhiro Yokoyama
CRYPTREC EX-2602-2016
(No.2602)
2016 Cryptographic Multilinear Maps - A Status Report -§2 Mehdi Tibouchi CRYPTREC EX-2603-2016
(No.2603)

Investigation Reports on Cryptographic Techniques in FY 2015

FY Title Authors PDF Files
2015 The Latest Trend of Integral Attack and Its Application to MISTY1, etc. Yosuke Todo CRYPTREC EX-2501-2015
(No.2501)
2015 Cryptographic Program Obfuscation§ Sanjam Garg CRYPTREC EX-2502-2015
(No.2502)

§:Summary is on page 53-56 of "CRYPTREC Report 2015; Report of the Cryptographic Technology Evaluation Committee".

Investigation Reports on Cryptographic Techniques in FY 2014

FY Title Authors PDF Files
2014 Security Evaluation of SHA-224, SHA-512/224, and SHA-512/256 Christoph Dobraunig, Maria Eichlseder, Florian Mendel CRYPTREC EX-2401-2014
(No.2401)
2014 Security Evaluation of SHA-3 Itai Dinur CRYPTREC EX-2402-2014
(No.2402)
2014 Security Evaluation Report on SHA-224, SHA-512/224, SHA-512/256, and the six SHA-3 Functions(August 28, 2015, updated) Donghoon Chang CRYPTREC EX-2403-2014R1
(No.2403)

Investigation Reports on Cryptographic Techniques in FY 2013

FY Title Authors PDF Files
2013 Performance Evaluation of Hash Functions, SHA-224, SHA-512/224, SHA-512/256, and SHA-3 (Keccak) Kazuo Sakiyama CRYPTREC EX-2301-2013
(No.2301)

Investigation Reports on Cryptographic Techniques in FY 2012

FY Title Authors PDF Files
2012 Related-key cryptanalysis of AES, Hierocrypt-3, and CipherUnicorn-A Dmitry Khovratovich CRYPTREC EX-2201-2012
(No.2201)
2012 Security analysis of the Block cipher Camellia Alex Biryukov CRYPTREC EX-2202-2012P1
(No.2202)
Security analysis of the Block cipher CLEFIA Alex Biryukov CRYPTREC EX-2202-2012P2
(No.2202)
Security analysis of the Block cipher SC2000 Alex Biryukov CRYPTREC EX-2202-2012P3
(No.2202)
2012 Security evaluation of 128-bit block ciphers AES, CIPHERUNICORN-A, and Hierocrypt-3 against biclique attacks Christian Rechberger CRYPTREC EX-2203-2012
(No.2203)
2012 Security Evaluation of Block Ciphers AES, Camellia, CLEFIA and SC2000 using Two New Techniques: Biclique Attacks and Zero-Correlation Linear Attacks Andrey Bogdanov CRYPTREC EX-2204-2012
(No.2204)
2012 Security evaluation of RC4 stream cipher Takanori Isobe CRYPTREC EX-2205-2012
(No.2205)

Investigation Reports on Cryptographic Techniques in FY 2011

FY Title Authors PDF Files
2011 Re-evaluation of Security against Linear Cryptanalysis of Block Ciphers in the CRYPTREC list Toshinobu Kaneko CRYPTREC EX-2101-2011
(No.2101)

Investigation Reports on Cryptographic Techniques in FY 2010

FY Title Authors PDF Files
2010 Security Evaluation of the Blockcipher CLEFIA (March 29, 2011, updated) Toshinobu Kaneko CRYPTREC EX-2001-2010R1
(No.2001)
2010 Evaluation of security level of CLEFIA - CRYPTREC EX-2002-2010
(No.2002)
2010 Security Evaluation Report of HyRAL (March 1, 2011, updated) Tetsu Iwata CRYPTREC EX-2003-2010R1
(No.2003)
2010 Security Analysis of HyRAL Heung Youl YOUM, Jung Hwan Song, Sun Young Lee CRYPTREC EX-2004-2010
(No.2004)
2010 Security Evaluation of PC-MAC-AES Lei Wang, Kazuo Sakiyama, Iwamasa Nishikado, Kazuo Ohta CRYPTREC EX-2005-2010
(No.2005)
2010 CRYPTREC evaluation report on PC-MAC-AES John P.Steinberger CRYPTREC EX-2006-2010
(No.2006)
2010 Security Evaluation of the Enocoro-128v2 Hidenori Kuwakado CRYPTREC EX-2007-2010
(No.2007)
2010 Security Evaluation of Stream Cipher Enocoro-128v2 Martin Hell and Thomas Johansson CRYPTREC EX-2008-2010
(No.2008)
2010 Security Evaluation of the KCipher-2 Yoshiaki Shiraishi CRYPTREC EX-2009-2010
(No.2009)
2010 Security Evaluation of the K2 Stream Cipher (March 29, 2011, updated) Bart Preneel CRYPTREC EX-2010-2010R1
(No.2010)
2010 Investigation Report on Security of Block-Cipher Modes of Operation and Message Authentication Codes Shoichi Hirose CRYPTREC EX-2011-2010
(No.2011)
2010 Evaluation of some Blockcipher Modes of Operation (March 4, 2011, updated) Phillip Rogaway CRYPTREC EX-2012-2010R1
(No.2012)
2010 Security Evaluation of ISO/IEC 9798 Protocols Akihiro Yamamura CRYPTREC EX-2013-2010
(No.2013)
2010 Evaluation of ISO/IEC 9798 Protocols (April 19, 2011, updated) David Basin and Cas Cremers CRYPTREC EX-2014-2010R1
(No.2014)

Investigation Reports on Cryptographic Techniques in FY 2006

FY Title Authors PDF Files
2006 Evaluation of Complexity of Mathematical Algorithms Thorsten Kleinjung CRYPTREC EX-0601-2006
(No.0601)
2006 Research and Evaluation Report on Computational Complexity of Discrete Logarithm Problems Shigenori Uchiyama CRYPTREC EX-0602-2006
(No.0602)
2006 Investigation Report on the Trend of Quantum Information Technologies and Their Problems in e-Government Use Hideki Imai CRYPTREC EX-0603-2006
(No.0603)

Investigation Reports on Cryptographic Techniques in FY 2005

FY Title Authors PDF Files
2005 Safety evaluation and attack method analysis of hash function(SHA-1) - CRYPTREC EX-0501-2005
(No.0501)
2005 On the Security of SHA-256/-384/-512 Toshinobu Kaneko CRYPTREC EX-0503-2005
(No.0503)
2005 Technical Investigation Report on Security Evaluations on Hash Functions Whirlpool and RIPEMD-160 and How to Strengthen SHA-1 Soichi Furuya CRYPTREC EX-0504-2005
(No.0504)
2005 Overseas investigation concerning nation policy for cryptographic algorithms - CRYPTREC EX-0505-2005
(No.0505)

Investigation Reports on Cryptographic Techniques in FY 2004

FY Title Authors PDF Files
2004 Investigation Report on Test Methods of the Pseudo Random Number Generating System Toshinobu Kaneko CRYPTREC EX-0211-2004
(No.0211)
2004 Investigation Report on Test Method of the Pseudo Random Number Generating System - Discrete Fourier Transform of NIST SP800-22 - Shoichi Hirose CRYPTREC EX-0212-2004
(No.0212)
2004 Technical Investigation Report on the Security of Hash Functions Shiho Moriai CRYPTREC EX-0213-2004
(No.0213)

Investigation Reports on Cryptographic Techniques in FY 2003

FY Title Authors PDF Files
2003 Research and Investigation Report on Integer Factoring Experiments Yuji Kida CRYPTREC EX-0201-2003
(No.0201)
2003 Evaluation Report on Integer Factoring Problems Kazumaro Aoki,
Hiroki Ueda,
Shigenori Uchiyama
CRYPTREC EX-0202-2003P1
(No.0202-1)
2002 Research and Investigation Report on Integer Factoring Problem:
- Report on the Implementation of SQUFOF Factoring Method -
CRYPTREC EX-0202-2003P2
(No.0202-2)
2003 Research and Investigation on the Polynomial Selection Part, the Linear Algebra part, and the Ideal Square Root Calculation Part of Number Field Sieve Method Takeshi Shimoyama ,
Tetsuya Izu
CRYPTREC EX-0203-2003
(No.0203)
2003 Investigation on Security of Block Cipher Modes of Operation Tetsu Iwata CRYPTREC EX-0204-2003
(No.0204)
2003 Technical Survey on Modes of Operation for Confidentiality - CRYPTREC EX-0205-2003
(No.0205)
2003 Investigation Report on Test Methods of Pseudo random Number Generator System
- Lempel-Ziv Compression Test -
Toshinobu Kaneko CRYPTREC EX-0206-2003
(No.0206)
2003 Investigation Report on the Method of Pseudo Random Number Generator System Shoichi Hirose CRYPTREC EX-0207-2003
(No.0207)
2003 Report on Investigation and Examination of Integer Factorization Hardware Tetsuya Izu,
Koichi Itoh,
Jun Kogure,
Kiyoshi Kohiyama,
Takeshi Shimoyama ,
Masahiko Takenaka,
Naoya Torii,
Shoichi Masui,
Kenji Mukaida(*)
CRYPTREC EX-0208-2003
(No.0208)
2003 Evaluation on Implementability of an Integrated Circuit Dedicated to Integer Factorization - CRYPTREC EX-0209-2003
(No.0209)
2003 Investigation Report on Security of SSL (Details) - CRYPTREC EX-0210-2003
(No.0210)

Investigation Reports on Cryptographic Algorithms and Related Technologies in FY 2002(No.0001-0039)

FY Title Authors PDF Files
2001 Evaluation Report on DSA Signature Tatsuaki Okamoto,
Masayuki Abe
CRYPTREC EX-0001-2001
(No.0001)
2001 Evaluation Report on DSA Signature - CRYPTREC EX-0002-2001
(No.0002)
2001 Evaluation Report on ECDSA Atsushi Shimbo,
Akito Niwa,
Koji Okada
CRYPTREC EX-0003-2001
(No.0003)
2002 Evaluation Report on ECDSA Tatsuaki Okamoto CRYPTREC EX-0004-2002
(No.0004)
2001 Detailed Evaluation Report on ESIGN Signature System - CRYPTREC EX-0005-2001
(No.0005)
2001 Evaluation Report on Cryptographic Algorithm RSA-OAEP Eiichiro Fujisaki CRYPTREC EX-0006-2001
(No.0006)
2001 Evaluation Report on RSA Encryption/Signature Kazuo Ota CRYPTREC EX-0007-2001
(No.0007)
2001 Evaluation Report on Cryptographic Algorithm RSA-PSS Atsushi Fujioka CRYPTREC EX-0008-2001
(No.0008)
2002 Report on RSA (PKCS#1 v1.5) Kazuo Ota CRYPTREC EX-0010-2001
(No.0010)
2001 Evaluation Report on Cryptographic Algorithm
- EPOC-2 and a Revised Version of EPOC-2
Hajime Watanabe CRYPTREC EX-0011-2001
(No.0011)
2001 Evaluation Report on EPOC-2 - CRYPTREC EX-0012-2001
(No.0012)
2001 Evaluation Report on Cryptographic Algorithm
- PSEC-2 and PSEC-KEM
Hajime Watanabe CRYPTREC EX-0014-2002
(No.0014)
2001 Detailed Evaluation Report on PSEC-KEM Algorithm - CRYPTREC EX-0015-2002
(No.0015)
2002 Security Evaluation of PSEC-KEM - CRYPTREC EX-0016-2001
(No.0016)
2002 Security Evaluation of PSEC-KEM - CRYPTREC EX-0017-2001
(No.0017)
2001 Factoring Report Preda Mihailescu CRYPTREC EX-0018-2001
(No.0018)
2001 Investigation and Research Report on Prime Factor Solution Problems - CRYPTREC EX-0019-2001
(No.0019)
2001 Report on Detailed Evaluation of Cryptographic Algorithm Yuji Kida CRYPTREC EX-0021-2001
(No.0021)
2001 Investigation and Study of Mathematical Algorithm
- Discrete Logarithm Problems concerning Multiplicative Group of Finite Field -
- CRYPTREC EX-0022-2001
(No.0022)
2002 Study and Investigation on Mathematical Algorithm - CRYPTREC EX-0023-2001
(No.0023)
2001 Security of CIPHERUNICORN-E Masayuki Kanda CRYPTREC EX-0024-2001
(No.0024)
2001 Detailed Investigation Report on Security of Symmetric Block Cipher CIPHERUNICORN-E Toshinobu Kaneko CRYPTREC EX-0025-2001
(No.0025)
2001 Security of CIPHERUNICORN-A Masayuki Kanda CRYPTREC EX-0026-2002
(No.0026)
2001 Detailed Investigation Report on Security of Symmetric Block Cipher CIPHERUNICORN-A Toshinobu Kaneko CRYPTREC EX-0027-2001
(No.0027)
2001 Evaluation Report on Cryptographic Algorithm (SEED) Shiho Moriai CRYPTREC EX-0028-2001
(No.0028)
2002 Detailed Investigation Report on Security of Pseudo Random Number Generator Toshinobu Kaneko CRYPTREC EX-0029-2001
(No.0029)
2001 Security Evaluation Report of MULTI-S01 Tetsu Iwata CRYPTREC EX-0030-2001
(No.0030)
2001 Investigation of RC4/arcfour Yoshiaki Shiraishi CRYPTREC EX-0031-2001
(No.0031)
2001 Evaluation of Cryptographic Algorithm Hidenori Kuwakado CRYPTREC EX-0032-2001
(No.0032)
2001 Investigation Report on Security of SSL - CRYPTREC EX-0033-2001
(No.0033)
2001 Investigation Report on Security of SSL
- Key Agreement Method and Signature Method using RSA Cryptograph -
Hajime Watanabe CRYPTREC EX-0034-2001
(No.0034)
2001 Evaluation Report on Security of SSL - CRYPTREC EX-0035-2001
(No.0035)
2001 Detailed Evaluation Report on Security of RC2 - CRYPTREC EX-0036-2002
(No.0036)
2001 Evaluation of Cryptographic Algorithm PANAMA Masahiko Takenaka,
Naoya Torii
CRYPTREC EX-0037-2001
(No.0037)
2002 Investigation Report on Evaluation of Security of Cryptographic Protocol - CRYPTREC EX-0038-2002
(No.0038)
2002 Investigation Report on Integer Factoring (Matrix Calculation Step) Circuit by Bernstein, A.K. Lenstra, et al. - CRYPTREC EX-0039-2002
(No.0039)

Investigation Report on Cryptographic Algorithm and Related Technology in FY 2002(No.0100-0129)

FY Title Authors PDF Files
2000 Evaluation of Defacto Cryptographic Algorithms Atsuko Miyaji CRYPTREC EX-0100-2000
(No.0100)
2000 Detailed Evaluation Report on ECDSA Tatsuaki Okamoto,
Atsushi Fujioka
CRYPTREC EX-0101-2000
(No.0101)
2000 Detailed Evaluation Report on ESIGN Signature Atsushi Shimbo,
Hideo Shimizu,
Koji Okada,
Akito Niwa
CRYPTREC EX-0102-2000
(No.0102)
2000 Evaluation Report on RSA-PSS - CRYPTREC EX-0103-2000
(No.0103)
2000 1. Detailed Evaluation (Attack Evaluation) of Cryptographic Algorithm "EPOC" Report - CRYPTREC EX-0104-2000P1
(No.0104)
2. Summary of Report CRYPTREC EX-0104-2000P2
(No.0104)
2000 Detailed Evaluation Report on ECAES Tatsuaki Okamoto,
Atsushi Fujioka
CRYPTREC EX-0105-2000
(No.0105)
2000 Detailed Evaluation Report on Security (HIME-1) - CRYPTREC EX-0106-2000
(No.0106)
2000 Detailed Evaluation Report on Security of HIME-2 - CRYPTREC EX-0107-2000
(No.0107)
2000 1. Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "ECDHS (Elliptic Curve Diffie-Hellman Scheme) in SEC1" - CRYPTREC EX-0108-2000P1
(No.0108)
2. Summary of Report CRYPTREC EX-0108-2000P2
(No.0108)
2000 Detailed Evaluation Report on Cryptographic Algorithm PSEC - CRYPTREC EX-0109-2000
(No.0109)
2000 Detailed Evaluation Report on Avalanche Test - CRYPTREC EX-0110-2000
(No.0110)
2000 Detailed Evaluation Report on Security of Common Key Block Cipher CIPHERUNICORN-E Takeshi Shimoyama CRYPTREC EX-0111-2000
(No.0111)
2000 Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of CIPHERUNICORN-E Masayuki Kanda CRYPTREC EX-0112-2000P1
(No.0112)
CRYPTREC EX-0112-2000P2
(No.0112)
2000 1.Higher-Order Differentialof CRYPTREC Submission Encryption and Security against Interpolation Attacks Toshinobu Kaneko CRYPTREC EX-0113-2000P1
(No.0113)
2.Appendix A: CIPHERUNICORN-E CRYPTREC EX-0113-2000P2
(No.0113)
3.Appendix B: MISTY1 CRYPTREC EX-0113-2000P3
(No.0113)
4.Appendix C: FEAL-NX CRYPTREC EX-0113-2000P4
(No.0113)
5.Appendix D: Hierocrypt(-L1,3) CRYPTREC EX-0113-2000P5
(No.0113)
6.Appendix E: CIPHERUNICORN-A CRYPTREC EX-0113-2000P6
(No.0113)
7.Appendix F: Camellia CRYPTREC EX-0113-2000P7
(No.0113)
8.Appendix G: RC6 CRYPTREC EX-0113-2000P8
(No.0113)
9.Appendix H: SC2000 CRYPTREC EX-0113-2000P9
(No.0113)
10.Appendix I: MARS CRYPTREC EX-0113-2000P10
(No.0113)
11.Appendix J: Linear Sum Attack Resistance of Encryption subject to Detailed Evaluation CRYPTREC EX-0113-2000P11
(No.0113)
2000 1.Detailed Evaluaiton (HW Implementation Evaluation) Report on Cryptographic Algorithm "Hierocrypt-L1" - CRYPTREC EX-0114-2000P1
(No.0114)
2.Summary of Report CRYPTREC EX-0114-2000P2
(No.0114)
2000 Detailed Evaluation Report on Security of Hierocrypt-L1 - CRYPTREC EX-0115-2000
(No.0115)
2000 Maximum Linear/Differential Probability and Maximum Linear/ Probability Differential Characteristic of Hierocrypt-L1 Shiho Moriai CRYPTREC EX-0116-2000P1
(No.0116)
CRYPTREC EX-0116-2000P2
(No.0116)
2000 Detailed Evaluation of Security of MISTY1 Kenji Ohkuma,
Fumihiko Sano
CRYPTREC EX-0117-2000P1
(No.0117)
CRYPTREC EX-0117-2000P2
(No.0117)
2000 Evaluation Report on MISTY1 H/W Implementation Masahiko Motoyama,
Masue Shiba
CRYPTREC EX-0118-2000
(No.0118)
2000 Probability Maximum Differential/Linear Probability of MISTY Masayuki Kanda CRYPTREC EX-0119-2000
(No.0119)
2000 On Triple DES - CRYPTREC EX-0120-2000
(No.0120)
2000 On Rijndael - CRYPTREC EX-0121-2000
(No.0121)
2000 Outline of Detailed Evaluation/Detailed Evaluation Report on Evaluation of Camellia Attack - CRYPTREC EX-0122-2000P1
(No.0122)
CRYPTREC EX-0122-2000P2
(No.0122)
2000 Evaluation Report on CAMELLIA H/W Implementation Masahiko Motoyama,
Masue Shiba
CRYPTREC EX-0123-2000
(No.0123)
2000 Maximum Differential Characteristic Probability and Maximum Linear Characteristic Probability of Camellia Masayuki Kanda CRYPTREC EX-0124-2000P1
(No.0124)
2000 CRYPTREC EX-0124-2000P2
(No.0124)
2000 Detailed Evaluation Report Concerning Security of Common Key Block Cipher CIPHERUNICORN-A Takeshi Shimoyama CRYPTREC EX-0125-2000
(No.0125)
2000 Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of CIPHERUNICORN-A Masayuki Kanda CRYPTREC EX-0126-2000P1
(No.0126)
CRYPTREC EX-0126-2000P2
(No.0126)
2000 1.Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "Hierocrypt-3" - CRYPTREC EX-0127-2000P1
(No.0127)
2.Summary of Report CRYPTREC EX-0127-2000P2
(No.0127)
2000 Detailed Evaluation Report on Security of Hierocrypt-3 - CRYPTREC EX-0128-2000
(No.0128)
2000 Maximum Linear/Differential Probability and Maximum Linear/Probability Differential Characteristic of Hierocrypt-3 Shiho Moriai CRYPTREC EX-0129-2000P1
(No.0129)
CRYPTREC EX-0129-2000P2
(No.0129)

Investigation Reports on Cryptographic Algorithms and Related Technologies in FY 2002(No.0130-0157)

FY Title Authors PDF Files
2000 1. Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "RC6" - CRYPTREC EX-0130-2000P1
(No.0130)
2.Summary of Report CRYPTREC EX-0130-2000P2
(No.0130)
2000 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "RC6" - CRYPTREC EX-0131-2000P1
(No.0131)
2.Summary of Report CRYPTREC EX-0131-2000P2
(No.0131)
2000 Detailed Evaluation of Cryptographic Algorithm Maximum Linear/Differential Probability and Maximum Linear/ Probability Differential Characteristic of 128bit-Block Cipher RC6 Kazumaro Aoki CRYPTREC EX-0132-2000
(No.0132)
2000 Detailed Evaluation of Security of SC2000 Kenji Ohkuma,
Fumihiko Sano
CRYPTREC EX-0133-2000P1
(No.0133)
CRYPTREC EX-0133-2000P2
(No.0133)
2000 Detailed Evaluation of Cryptographic Algorithm Maximum Linear/Differential Probability and Maximum Linear/Differential Characteristic Probability of 128bit-Block Cipher SC2000 Kazumaro Aoki CRYPTREC EX-0134-2000
(No.0134)
2000 Outline of H/W Implementation Evaluation (MULTI-S01)/Detailed Evaluation Report MULTI-S01H/W Implementation Evaluation - CRYPTREC EX-0135-2000P1
(No.0135)
CRYPTREC EX-0135-2000P2
(No.0135)
2000 1.Detailed Evaluation Report on Cryptographic Algorithm Stream Cipher MULTI-S01 - CRYPTREC EX-0136-2000P1
(No.0136)
2.Data used for Evaluation of MULTI-S01 Encryption CRYPTREC EX-0136-2000P2
(No.0136)
3.Evaluation of Stream Cipher Long-Period Linkage Test MULTI-S01 CRYPTREC EX-0136-2000P3
(No.0136)
4.Evaluation of Stream Cipher Linkage Test MULTI-S01 CRYPTREC EX-0136-2000P4
(No.0136)
5.Evaluation of Stream Cipher 0/1 Balance Test MULTI-S01 CRYPTREC EX-0136-2000P5
(No.0136)
6.Evaluation of Stream Cipher Mutual Information Test MULTI-S01 CRYPTREC EX-0136-2000P6
(No.0136)
7.Evaluation of Stream Cipher Linear Complexity Test MULTI-S01 CRYPTREC EX-0136-2000P7
(No.0136)
8.Evaluation of Stream Cipher Uniformity Test MULTI-S01 CRYPTREC EX-0136-2000P8
(No.0136)
2000 1.Detailed Evaluation Report on Cryptographic Algorithm Pseudo Random Number Generator PANAMA (MULTI-S01 Inside) - CRYPTREC EX-0137-2000P1
(No.0137)
2.Type of Key Used for Evaluation of PANAMA CRYPTREC EX-0137-2000P2
(No.0137)
3.Evaluation of Pseudo Random Number Generator 0/1 Balance Test for PANAMA (MULTI-S01) CRYPTREC EX-0137-2000P3
(No.0137)
4.Evaluation of Pseudo Random Number Generator Avalanche Test for PANAMA (MULTI-S01) CRYPTREC EX-0137-2000P4
(No.0137)
5.Evaluation of Pseudo Random Number Generator Uniformity Test for PANAMA (MULTI-S01) CRYPTREC EX-0137-2000P5
(No.0137)
6.Evaluation of Pseudo Random Number Generator Long-Period Linkage Test for PANAMA (MULTI-S01) CRYPTREC EX-0137-2000P6
(No.0137)
7.Evaluation of Pseudo Random Number Generator Linkage Test for PANAMA (MULTI-S01) CRYPTREC EX-0137-2000P7
(No.0137)
8.Evaluation of Pseudo Random Number Generator Linear Complexity Test for PANAMA (MULTI-S01) CRYPTREC EX-0137-2000P8
(No.0137)
2000 Detailed Evaluation of Cryptographic Algorithms Satoshi Uehara CRYPTREC EX-0138-2000P1
(No.0138)
CRYPTREC EX-0138-2000P2
(No.0138)
CRYPTREC EX-0138-2000P3
(No.0138)
CRYPTREC EX-0138-2000P4
(No.0138)
CRYPTREC EX-0138-2000P5
(No.0138)
CRYPTREC EX-0138-2000P6
(No.0138)
CRYPTREC EX-0138-2000P7
(No.0138)
CRYPTREC EX-0138-2000P8
(No.0138)
CRYPTREC EX-0138-2000P9
(No.0138)
CRYPTREC EX-0138-2000P10
(No.0138)
CRYPTREC EX-0138-2000P11
(No.0138)
CRYPTREC EX-0138-2000P12
(No.0138)
2000 Other Cryptographic Algorithms which need to be evaluated
Investigation on Hash Functions
LEE Seon Young CRYPTREC EX-0139-2000
(No.0139)
2000 Pseudo random Number Generator with SHA-1 - CRYPTREC EX-0140-2000
(No.0140)
2000 Evaluation Report on ACE Encryption Attack/General - CRYPTREC EX-0141-2000P1
(No.0141)
CRYPTREC EX-0141-2000P2
(No.0141)
2000 Detailed Evaluation Report on MY-ELLY ECMR-XXX-h - CRYPTREC EX-0142-2000
(No.0142)
2000 Evaluation Report on ACE Signature Attack/General - CRYPTREC EX-0143-2000P1
(No.0143)
CRYPTREC EX-0143-2000P2
(No.0143)
2000 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "ECMQVS (Elliptic Curve MQV Scheme) in SEC1" - CRYPTREC EX-0144-2000P1
(No.0144)
2.Summary of Report CRYPTREC EX-0144-2000P2
(No.0144)
2000 Outline of Detailed Evaluation of HDEF-ECDH/Detailed Evaluation Report on HDEF-ECDH - CRYPTREC EX-0145-2000P1
(No.0145)
CRYPTREC EX-0145-2000P2
(No.0145)
2000 Detailed Evaluation Report on ESIGN Authentication Atsushi Shimbo ,
Hideo Shimizu,
Koji Okada,
Akito Niwa
CRYPTREC EX-0146-2000
(No.0146)
2000 Outline of Detailed Evaluation of FEAL-NX/Detailed Evaluation Report on Cryptanalysis against FEAL-NX - CRYPTREC EX-0147-2000P1
(No.0147)
CRYPTREC EX-0147-2000P2
(No.0147)
2000 Outline of Detailed Evaluation of FEAL-NX/Detailed Evaluation Report on Cryptanalysis against FEAL-NX - CRYPTREC EX-0148-2000P1
(No.0148)
CRYPTREC EX-0148-2000P2
(No.0148)
2000 Detailed Evaluation (HW Implementation Evaluation) Report on Cryptographic Algorithm "FEAL-NX" "FEAL-NX"/Summary of Report Masayuki Kanda CRYPTREC EX-0149-2000P1
(No.0149)
CRYPTREC EX-0149-2000P2
(No.0149)
2000 1.Probability Maximum Differential Characteristic and Probability Maximum Linear Characteristic of FEAL - CRYPTREC EX-0150-2000P1
(No.0150)
2000 2.Summary of Report CRYPTREC EX-0150-2000P2
(No.0150)
2000 1.Detailed Evaluation (Attack Evaluation) Report on Cryptographic Algorithm "MARS" - CRYPTREC EX-0151-2000P1
(No.0151)
2000 2.Summary of Report CRYPTREC EX-0151-2000P2
(No.0151)
2000 Probability Maximum Differential/Linear Characteristics of MARS Shiho Moriai CRYPTREC EX-0152-2000P1
(No.0152)
CRYPTREC EX-0152-2000P2
(No.0152)
2000 Outline of H/W Implementation Evaluation (TOYOCRYPT-HS1)/Detailed Evaluation Report Evaluation of TOYOCRYPT-HS1 H/W Implementation - CRYPTREC EX-0153-2000P1
(No.0153)
CRYPTREC EX-0153-2000P2
(No.0153)
2000 Evaluation Report on TOYOCRYPT-HS1/Gist of Evaluation - CRYPTREC EX-0154-2000P1
(No.0154)
CRYPTREC EX-0154-2000P2
(No.0154)
2000 1.Detailed Evaluation Report on Cryptographic Algorithm Stream Cipher TOYOCRYPT-HS1 - CRYPTREC EX-0155-2000P1
(No.0155)
2000 2.Type of Keys Used for Evaluation of TOYOCRYPT Series CRYPTREC EX-0155-2000P2
(No.0155)
2000 3.Evaluation of Stream Cipher Mutual Information Test TOYOCRYPT-HS1 CRYPTREC EX-0155-2000P3
(No.0155)
2000 Evaluation Report on TOYOCRYPT-HR1/Gist of Evaluation - CRYPTREC EX-0156-2000P1
(No.0156)
CRYPTREC EX-0156-2000P2
(No.0156)
2000 1.Detailed Evaluation Report on Cryptographic Algorithm Pseudo random Number Generator TOYOCRYPT-HR1 - CRYPTREC EX-0157-2000P1
(No.0157)
2.Type of Key Used for Evaluation of TOYOCRYPT Series CRYPTREC EX-0157-2000P2
(No.0157)
3.Evaluation of Pseudo random Number Generator Long-Period Linkage Test for TOYOCRYPT-HR1 CRYPTREC EX-0157-2000P3
(No.0157)
4.Evaluation of Pseudo Random Number Generator 0/1 Balance Test for TOYOCRYPT-HR1 CRYPTREC EX-0157-2000P4
(No.0157)
5.Evaluation of Pseudo Random Number Generator Linear Complexity Test for TOYOCRYPT-HR1 CRYPTREC EX-0157-2000P5
(No.0157)
6.Evaluation of Pseudo Random Number Generator Avalanche Test for TOYOCRYPT-HR1 CRYPTREC EX-0157-2000P6
(No.0157)
7.Evaluation of Pseudo Random Number Generator Uniformity Test for TOYOCRYPT-HR1 CRYPTREC EX-0157-2000P7
(No.0157)
8.Evaluation of Pseudo random Number Generator Linkage Test for TOYOCRYPT-HR1 CRYPTREC EX-0157-2000P8
(No.0157)

List of Cryptographic Algorithms and Related Techniques Evaluation Reports in FY2002 (Overseas)

FY Classification Title Authors PDF Files
2001 DSA DSA-Security Evaluation of the Signature Scheme and Primitive- Jean-Jacques Quisquater CRYPTREC EX-1001-2001
(No.1001)
2001 DSA Evaluation Report on DSA Serge Vaundenay CRYPTREC EX-1002-2001
(No.1002)
2001 DSA The Digital Signature Algorithm (DSA) Johannes Buchmann CRYPTREC EX-1003-2001
(No.1003)
2001 ECDSA Evaluation Report on the ECDSA signature scheme Jaques Stern CRYPTREC EX-1004-2001
(No.1004)
2001 ECDSA Evaluation Report on ECDSA Serge Vaudenay CRYPTREC EX-1005-2001
(No.1005)
2001 ECDSA Security Level of Cryptography-ECDSA Dan Boneh and Phillip Rogaway CRYPTREC EX-1006-2001
(No.1006)
2001 ESIGN A review of the ESIGN digital signature standard Nicholas Howgrave-Graham CRYPTREC EX-1007-2001
(No.1007)
2001 ESIGN Approximate l -th roots moduro n Brigitte Vallee CRYPTREC EX-1008-2001
(No.1008)
2001 ESIGN Evaluation Report on the ESIGN signature scheme Jaques Stern CRYPTREC EX-1009-2001
(No.1009)
2001 ESIGN Security of N=P2Q in ESIGN/ The size of the exponent in ESIGN Marc Girault and Jean-Francois Misarsky CRYPTREC EX-1010-2001
(No.1010)
2001 RSA-OAEP/RSA Signature Evaluation of Security Level of Cryptography:RSA-OAEP, RSA-PSS,RSA Signature Alfred Menezes CRYPTREC EX-1011-2001
(No.1011)
2001 RSA-OAEP/RSA Signature Evaluation Report on the RSA-OAEP encryption scheme Jaques Stern CRYPTREC EX-1012-2001
(No.1012)
2002 RSA-PKCS Evaluation of Cryptographic Techniques Jean-Sebastien Coron CRYPTREC EX-1013-2002
(No.1013)
2002 RSA-PKCS Evaluation of Security Level of Cryptography:RSA Signature Schemes
(PKCS#1 v1.5,ANSI X9.31,ISO9796)
Alfred Menezes CRYPTREC EX-1014-2002
(No.1014)
2002 ECIES ECIES-Security Evaluation of the Encryption Scheme and Primitives- Jean-Jacques Quisquater CRYPTREC EX-1015-2002
(No.1015)
2002 ECIES Evaluation Report on the ECIES Cryptosystem Jaques Stern CRYPTREC EX-1016-2002
(No.1016)
2002 HIME (R) Evaluation of Security Level of Cryptography:The HIME (R) Encryption Scheme Alfred Menezes CRYPTREC EX-1017-2002
(No.1017)
2002 HIME (R) Evaluation Report on the HIME (R) Cryptosystem Jaques Stern CRYPTREC EX-1018-2002
(No.1018)
2002 HIME (R) Evaluation Report of HIME (R) - CRYPTREC EX-1019-2001
(No.1019)
2001 PSEC2 Evaluation of Security Level of Cryptography:The Revised Version of PSEC-2 (PSEC-KEM) Alfred Menezes CRYPTREC EX-1020-2001
(No.1020)
2001 EPOC2 Evaluation of Security Level of Cryptography: The Revised Version of EPOC-2 Alfred Menzes CRYPTREC EX-1021-2001
(No.1021)
2001 EPOC2 EPOC-2 Security Evaluation of the Encryption Scheme Jean-Jacques Quisquater CRYPTREC EX-1022-2001
(No.1022)
2001 Factoring Problem Evaluation Report on the Factoring Problem Jaques Stern CRYPTREC EX-1023-2001
(No.1023)
2001 Factoring Problem Security Level of Cryptography-Integer Factoring Problem (Factoring N=p2q) Dan Boneh CRYPTREC EX-1024-2001
(No.1024)
2001 Factoring Problem Report on Integer Factorization Rene Peralta CRYPTREC EX-1025-2001
(No.1025)
2001 Discrete Logarithm Problem over Finite Fields Computing discrete logarithms in the multiplicative group of a finite field Johannes Buchmann CRYPTREC EX-1026-2002
(No.1026)
2001 Discrete Logarithm Problem over Finite Fields Evaluation Report on the Discrete Logarithm Problem over finite fields Jaques Stern CRYPTREC EX-1027-2001
(No.1027)
2001 Elliptic Curve Discrete Logarithm Preblem Evaluation of Security Level of Cryptography:The Elliptic Curve Discrete Logarithm Problem (ECDLP) Alfred Menezes CRYPTREC EX-1028-2001
(No.1028)
2001 Elliptic Curve Discrete Logarithm Preblem Evaluation Report for CRYPTREC:Security Level of Cryptography {ECDLP Mathematical Problem S.D.Galbraith and N.P.Smart CRYPTREC EX-1029-2001
(No.1029)
2002 Generation Methods of Elliptic Curves Generartion Methods of Elliptic Curves Harald Baier and Johannes Buchmann CRYPTREC EX-1030-2002
(No.1030)
2001 CIPHERUNICORN-E A Crptographic Review of Cipherunicorn E Matt Robshaw CRYPTREC EX-1031-2001
(No.1031)
2001 CIPHERUNICORN-E An Evaluation of the Security of CipherUnicorn-E Against Certain Attacks David Wagner CRYPTREC EX-1032-2001
(No.1032)
2001 CIPHERUNICORN-A A Cryptographic Review of Cipherunicorn A Matt Robshaw CRYPTREC EX-1033-2001
(No.1033)
2001 CIPHERUNICORN-A An Evaluation of the Security of CipherUnicorn-A Against Certain Attacks David Wagner CRYPTREC EX-1034-2001
(No.1034)
2002 MUGI Evaluation of the MUGI Pseudo-Random Number Generator Ed Dawson, Gary Carter, Helen Gustafson, Matt Henricksen, Bill Millan and Leonie Simpson CRYPTREC EX-1035-2002
(No.1035)
2002 MUGI Report on Security Evaluation of MUGI Stream Cipher Miorag Mihaljevic CRYPTREC EX-1036-2002
(No.1036)
2002 MUGI Security Evaluation of MUGI Jovan Golic CRYPTREC EX-1037-2002
(No.1037)
2001 MULTI-S01 Security Level of Cryptography-Security evaluation (especially in mode part)for the stream cipher MULTI-S01 Phillip Rogaway CRYPTREC EX-1038-2001
(No.1038)
2001 PANAMA1 An Evaluation of the Security of MULTI-S01 David Wagner CRYPTREC EX-1039-2001
(No.1039)
2001 PANAMA1 Report on Security Evaluation of PANAMA Stream Cipher Miorag Mihaljevic CRYPTREC EX-1040-2001
(No.1040)
2001 SEED Analysis of SEED - CRYPTREC EX-1041-2001
(No.1041)
2001 RC2 Analysis of RC2 - CRYPTREC EX-1042-2001
(No.1042)
2002 RC4 Evaluation of RC4 Stream Cipher Ed Dawson, Helen Gustafson, Matt Henricksen and Bill Millan CRYPTREC EX-1043-2002
(No.1043)
2002 RC4 Report on Security Evaluation of RC4 Stream Cipher Miorag Mihaljevic CRYPTREC EX-1044-2002
(No.1044)
2001 SHA256 Evaluation Report Security Level of Cryptography-SHA-256 Helena Handschuh and Henri Gilbert CRYPTREC EX-1045-2001
(No.1045)
2001 SHA384/512 Evaluation Report Security Level of Cryptography-SHA-384 and SHA-512 Henri Gilbert and Helena Handschuh CRYPTREC EX-1046-2001
(No.1046)
2002 Survey of Side channel attacks Side channel attacks Jean-Jacques Quisquater and Francois Koeune CRYPTREC EX-1047-2002
(No.1047)
2000 ACE Sign Evaluation of the Security of ACE Sign Johannes Buchmann CRYPTREC EX-1048-2000
(No.1048)
2000 ACE Sign Evaluation of Security Level of Cryptography:ACE Signature Scheme Alfred Menezes et al. CRYPTREC EX-1049-2000
(No.1049)
2000 ECDSA in SEC1 Evaluation of the Security of ECDSA Johannes Buchmann CRYPTREC EX-1050-2000
(No.1050)
2000 ECDSA in SEC1 Evaluation of Security Level of Cryptography:ECDSA Signature Scheme Alfred Menezes et al. CRYPTREC EX-1051-2000
(No.1051)
2000 ESIGN Evaluation of the Security of ESIGN Johannes Buchmann CRYPTREC EX-1052-2000
(No.1052)
2000 ESIGN Evaluation of Security Level of Cryptography:ESIGN Signature Scheme ALfred Menezes et al. CRYPTREC EX-1053-2000
(No.1053)
2000 MY-ELLY
ECMR-XXX-h
Evaluation of the Security of My-Ellty ECMR Johannes Buchmann CRYPTREC EX-1054-2000
(No.1054)
2000 MY-ELLY
ECMR-XXX-h
Evaluation of Security Level of Cryptography:MY-ELLY Signature Scheme Alfred Menezes et al. CRYPTREC EX-1055-2000
(No.1055)
2000 ACE Encrypt Evaluation Report on the ACE Encrypt Cryptosystem
-Summary of Evaluation
Jaques Stern CRYPTREC EX-1056-2000
(No.1056)
2000 ACE Encrypt Security Level of Cryptography-ACE - CRYPTREC EX-1057-2000
(No.1057)
2000 ECAES in SEC1 Evaluation Report on the ECAES Cryptosystem.
Summary of Evaluation
Jaques Stern CRYPTREC EX-1058-2000
(No.1058)
2000 ECAES in SEC1 Security Level of Cryptography-ECAES - CRYPTREC EX-1059-2000
(No.1059)
2000 EPOC Evaluation Report on the EPOC Cryptosystem.
Summary of Evaluation
Jaques Stern CRYPTREC EX-1060-2000
(No.1060)
2000 EPOC Security Level of Cryptography-EPOC - CRYPTREC EX-1061-2000
(No.1061)
2000 HIME-2 Evaluation Report on the HIME-2 Cryptosystem Jaques Stern CRYPTREC EX-1062-2000
(No.1062)
2000 HIME-2 Security Level of Cryptography:HIME-2 - CRYPTREC EX-1063-2000
(No.1063)
2000 PSEC Evaluation Report on the PSEC Cryptosystem Jaques Stern CRYPTREC EX-1064-2000
(No.1064)
2000 PSEC Security Level of Cryptography-PSEC - CRYPTREC EX-1065-2000
(No.1065)
2000 ECDH in SEC1 Evaluation Report on the ECDHS Cryptosystem Jaques Stern CRYPTREC EX-1066-2000
(No.1066)
2000 ECDH in SEC1 Evaluation of Security Level of Cryptography ECDHS Phillip Rogaway, Mihir Bellare and Dan Boneh CRYPTREC EX-1067-2000
(No.1067)
2000 ECMQV in SEC1 Evaluation Report on the ECMQVS Cryptosystem Jaques Stern CRYPTREC EX-1068-2000
(No.1068)
2000 ECMQV in SEC1 Evaluation of Security Level of Cryptography ECMQVS (from SEC1) Phillip Rogaway, Mihir Bellare and Dan Boneh CRYPTREC EX-1069-2000
(No.1069)
2000 HDEF-ECDH Evaluation Report on the HDEF-ECDH Cryptosystem. Jaques Stern CRYPTREC EX-1070-2000
(No.1070)
2000 HDEF-ECDH Evaluation of Security Level of Cryptography HDEF-ECDH Phillip Rogaway, Mihir Bellare and Dan Boneh CRYPTREC EX-1071-2000
(No.1071)
2000 HIME-1 Evaluation Report on the HIME-1 Cryptosystem Jaques Stern CRYPTREC EX-1072-2000
(No.1072)
2000 SUMMERY Summary of Evaluation Jaques Stern CRYPTREC EX-1073-2000
(No.1073)
2000 SUMMERY Evaluation of Security Level of Cryptography Key-Sharing Schemes (Summary) Phillip Rogaway CRYPTREC EX-1074-2000
(No.1074)
2000 HIME-1 Evaluation of Security Level of Cryptography HIME-1 Dan Boneh, CRYPTREC EX-1075-2000
(No.1075)
2000 ESIGN Evaluation of the Security of ESIGN Identification Johannes Buchmann CRYPTREC EX-1076-2000
(No.1076)
2000 ESIGN Evaluation of Security Level of Cryptography:ESIGN Identification Scheme Alfred Menezes et al. CRYPTREC EX-1077-2000
(No.1077)
2000 CIPHERUNICORN-E Analysis of four 64-bit Symmetric Ciphers Serge Vaudenay CRYPTREC EX-1078-2000
(No.1078)
2000 FEAL-NX Analysis of four 64-bit Symmetric Ciphers Serge Vaudenay CRYPTREC EX-1079-2000
(No.1079)
2000 Hierocrypt-L1 Analysis of four 64-bit Symmetric Ciphers Serge Vaudenay CRYPTREC EX-1080-2000
(No.1080)
2000 MISTY1 Analysis of four 64-bit Symmetric Ciphers (Chapter 4) Serge Vaudenay CRYPTREC EX-1081-2000
(No.1081)
2000 Camellia Analysis of Camellia - CRYPTREC EX-1082-2000
(No.1082)
2000 CIPHERUNICORN-A Analysis of Cipherunicorn-A - CRYPTREC EX-1083-2000
(No.1083)
2000 Hierocrypt-3 Analysis of Hierocrypt-3 - CRYPTREC EX-1084-2000
(No.1084)
2000 MARS Analysis of MARS - CRYPTREC EX-1085-2000
(No.1085)
2000 RC6 Analysis of RC6 - CRYPTREC EX-1086-2000
(No.1086)
2000 SC2000 Analysis of SC2000 - CRYPTREC EX-1087-2000
(No.1087)
2000 MULTI-S01 Evaluation of MULTI-S01 Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan and Gray Carter CRYPTREC EX-1088-2000
(No.1088)
2000 TOYOCRYPT-HS1 Evaluation of TOYOCRYPT-HS1 Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan and Leonie Sipmson CRYPTREC EX-1089-2000
(No.1089)
2000 TOYOCRYPTR-HR1 Evaluation of TOYOCRYPT-HR1 Ed Dawson, Andrew Clark, Helen Gustafson, Bill Millan and Leonie Sipmson CRYPTREC EX-1090-2000
(No.1090)