titre de la présentation
|
|
- ぜんま もてぎ
- 4 years ago
- Views:
Transcription
1 Low Cost Cryptography Matt Robshaw Orange Labs France Orange Labs
2 Cryptography in a Nutshell Cryptography provides the foundation to many security solutions Algorithms can be divided into two classes Symmetric: participants share the same key material Asymmetric: participants use different key material You can (almost) do everything you want with either The important differences are in the supporting infrastructure This can make one type more suitable than another Low Cost Cryptogrpahy Matt Robshaw (2) Orange Labs
3 Low Cost Applications There is much interest in low cost cryptography RFID tags, sensor networks, ubiquitous computing We might want to authenticate a device; e.g. anti-cloning in an RFID tag We might want to authenticate information between devices; e.g. information sent from sensor tags We are probably less interested in encryption There may be specific issues; e.g. re-keying Low Cost Cryptogrpahy Matt Robshaw (3) Orange Labs
4 Cryptographic Performance In general we rarely care about performance But it is important for restricted hardware applications What do we mean by performance? Speed of operation? Speed of operation with different keys? Physical space in hardware? Power consumption? "Is this algorithm the best?" not a good question A better question is "Is this algorithm good enough?" e.g. 12% faster than the AES is probably not that interesting Low Cost Cryptogrpahy Matt Robshaw (4) Orange Labs
5 Requirements For low-cost applications we're interested in a small footprint in hardware a low average and peak power consumption Often we are willing to make some compromises we might be willing to sacrifice speed up to some limit we might be willing to trade security e.g operations is probably reasonable Low Cost Cryptogrpahy Matt Robshaw (5) Orange Labs
6 Space Requirements The space depends on the "state" and the "operations" The size of the state depends on the security level Block cipher: n-bit block leads to 2 n/2 distinguishing attack Stream cipher: n-bit state leads to 2 n/2 state recovery attack There are various Time/Memory/Data trade-offs Operations (and hence algorithm implementations) can be compared using the notion of gate equivalents (GE) Low Cost Cryptogrpahy Matt Robshaw (6) Orange Labs
7 Disclaimer Performance figures in this presentation are indicative! Hardware implementations can explore many trade-offs Implementations may use different technologies and be optimised with regards to different metrics However, the general capabilities of an algorithm (and its class/type) should be reasonably apparent Low Cost Cryptogrpahy Matt Robshaw (7) Orange Labs
8 Block Ciphers Can be used for authentication or encryption Device authentication via a challenge-response protocol Data authentication via a MAC Data encryption in some encryption mode The state-of-the-art is very advanced Low Cost Cryptogrpahy Matt Robshaw (8) Orange Labs
9 Relative Sizes (encrypt-only) GE Key Size Block Size KASUMI AES HIGHT mcrypton DES SEA DESXL TEA XTEA PRESENT Low Cost Cryptogrpahy Matt Robshaw (9) Orange Labs
10 PRESENT (CHES 2007) Collaborative design between FTRD, DTU, and Bochum Designed from scratch to be hardware-efficient Based on the design of Serpent The most hardware efficient of the AES finalists SPN (substitution-permutation-network) Very simple design that allows Good implementation trade-offs Basic, but sound, security assessment Low Cost Cryptogrpahy Matt Robshaw (10) Orange Labs
11 PRESENT (CHES 2007) Low Cost Cryptogrpahy Matt Robshaw (11) Orange Labs
12 PRESENT (CHES 2007) The breakdown of space requirements is as follows GE % GE % Data state KS state S-layer KS S-box P-layer 0 0 KS Rotation 0 0 Counter: state KS Counter xor Counter: combin Other Key xor Low Cost Cryptogrpahy Matt Robshaw (12) Orange Labs
13 PRESENT (CHES 2007) The 4-bit S-box can be implemented in 28 GE Satisfies good cryptographic properties Compare to 4-bit S-box in mcrypton which requires 107 GE AES S-box requires 395 GE (Anubis S-box requires 120 GE) Basic differential or linear cryptanalysis needs > 2 64 text Algebraic attacks a potential concern PRESENT consists of 11,067 quadratic equations in 4,216 variables Small-scale experiments quickly run out of memory and time Low Cost Cryptogrpahy Matt Robshaw (13) Orange Labs
14 Block / Stream Ciphers Are stream ciphers necessarily more compact than block ciphers? Low Cost Cryptogrpahy Matt Robshaw (14) Orange Labs
15 Stream Ciphers The reputation of stream ciphers is that they are faster and lighter than block ciphers Commercially, stream ciphers are widely used Many proprietary designs consist of shift register arrays These can lend themselves to efficient implementation However the stream ciphers in general use are large The estream project is attempting to address this Low Cost Cryptogrpahy Matt Robshaw (15) Orange Labs
16 estream estream is a multi-year project to promote stream cipher research Submissions were invited for two profiles 1. Fast performance in software 2. Resource-efficient in constrained hardware environments We are now in the last year with the 34 original entries reduced to eight in each profile Low Cost Cryptogrpahy Matt Robshaw (16) Orange Labs
17 estream The final eight Profile 2 (hardware) candidates are DECIM v2 Edon-80 F-FCSR-H v2 Grain v1 MICKEY v2 MOUSTIQUE POMARANCH v3 Trivium Low Cost Cryptogrpahy Matt Robshaw (17) Orange Labs
18 Relative Sizes (rough guide in GE) GE Notes SNOW ISO standardised RC Widely used (e.g. TLS) A5/ Ill-fated GSM encryption algorithm QUAD 3700 Some element of provable security DECIM v estream (Profile II) Edon estream (Profile II) F-FCSR-H 3200 estream (Profile II) Grain v estream (Profile II) MICKEY v estream (Profile II) POMARANCH v estream (Profile II) Trivium 1500 estream (Profile II) Low Cost Cryptogrpahy Matt Robshaw (18) Orange Labs
19 Asymmetric Algorithms Generally speaking asymmetric cryptography is heavier than symmetric cryptography "Anyway, public-key cryptography is too heavy to be implemented within low cost tags. Thus we only deal with tags [ ] capable of using symmetric cryptography." [Avoine, 2005] However the GPS identification scheme shows that this is not necessarily the case Low Cost Cryptogrpahy Matt Robshaw (19) Orange Labs
20 Relative Sizes (rough guide in GE) GE Cycles Notes ECC (p 166 ) ECC ( p 192 ) ECC (p 100 ) ECC (2 67 ) For use in EC Schnorr ID NTRU (encrypt) GPS ID scheme Uses coupons Excellent article at Complete on-tag GPS has been realised in 2000 GE Low Cost Cryptogrpahy Matt Robshaw (20) Orange Labs
21 GPS Identification Scheme Due to Girault, Poupard, and Stern ISO Standardised Also listed in the final NESSIE portfolio Can be based on RSA-like moduli or ECC There is a wide range of optimisations In the most interesting embodiment we use coupons With coupons the on-tag computation is an integer addition Low Cost Cryptogrpahy Matt Robshaw (21) Orange Labs
22 GPS in Practice Secret key s TAG READER Public key V = -sg Choose r Compute x = hash(rg) x c Choose c Compute y = r + sc verify x = hash( yg + cv) Low Cost Cryptogrpahy Matt Robshaw (22) Orange Labs
23 GPS in Practice Choose r i Compute x i = hash(r i G) Store coupon (r i, x i ) Secret key s TAG READER Public key V = -sg Choose coupon (r i, x i ) x i c Choose c Compute y = r i + sc verify x i = hash( yg + cv) Low Cost Cryptogrpahy Matt Robshaw (23) Orange Labs
24 GPS Computation Use Advanced Encryption Standard (AES) as a benchmark Space Current Time Time (Gates) (μamps) (Clock cycles) (Seconds) AES ms GPS ms GPS (LHW) ms GPS (LHW) ms change the clock frequency Low Cost Cryptogrpahy Matt Robshaw (24) Orange Labs
25 GPS Ongoing Work Implementation requires additional memory and logic Fully-functioning variants require around 2000 GE The use of coupons has an impact on the applications This requires a limited number of uses per tag Compatible with many RFID-applications: use infrequently and throw away Low Cost Cryptogrpahy Matt Robshaw (25) Orange Labs
26 Fundamental Issues (1) Do we need security? Do we need cryptographic security? EPCglobal develops industry standards The kill command renders the tag inoperable Many security threats are prevented; e.g. tracking a tag Other security features include strong audit trails For many applications basic solutions are sufficient! But not all Low Cost Cryptogrpahy Matt Robshaw (26) Orange Labs
27 Fundamental Issues (2) What about Moore's Law? The number of transistors at minimum component cost doubles roughly every 18 months A relaxed version might be every two years Will Moore's Law come to our aid? Low Cost Cryptogrpahy Matt Robshaw (27) Orange Labs
28 Fundamental Issues (2) GE Threshold GE for most crypto Target GE today Year Moore's Law Relaxed Moore's Law Low Cost Cryptogrpahy Matt Robshaw (28) Orange Labs
29 Fundamental Issues (2) There are two schools of thought #1: There will always be a need for the cheapest, smallest solution #2: Provided the price / functionality of a "large" solution is acceptable, there will be no need to take a smaller one Low Cost Cryptogrpahy Matt Robshaw (29) Orange Labs
30 Summary (rough guide in GE) SNOW 2.0 AES RC4 DES Established Stream Ciphers Established Block Ciphers Dedicated stream ciphers estream Dedicated block ciphers Various sources SHA WPI SHA MD5 [MD4] 8001 [7350] TU Graz ECC k Various sources GPS 2000 FTRD Low Cost Cryptogrpahy Matt Robshaw (30) Orange Labs
31 Conclusions New application areas bring new security challenges Low cost cryptography is a very active research area Contrary to popular belief, stream ciphers are not intrinsically better-suited than block ciphers Contrary to popular belief, there are public key techniques that are suitable for constrained environments Low Cost Cryptogrpahy Matt Robshaw (31) Orange Labs
(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More information2
2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception.
More information<95DB8C9288E397C389C88A E696E6462>
2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,
More informationProposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th
Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai shiho@isl.ntt.co.jp NTT Laboratories 128-bit Block Cipher Camellia Kazumaro Aoki * Tetsuya Ichikawa Masayuki
More informationL1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? Well,/ you re very serious person/ so/ I think/ your blood type is A. Wow!/ G
L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? 当ててみて / 私の血液型を Well,/ you re very serious person/ so/ I think/ your blood type is A. えーと / あなたはとっても真面目な人 / だから / 私は ~ と思います / あなたの血液型は
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More informationはじめに
IT 1 NPO (IPEC) 55.7 29.5 Web TOEIC Nice to meet you. How are you doing? 1 type (2002 5 )66 15 1 IT Java (IZUMA, Tsuyuki) James Robinson James James James Oh, YOU are Tsuyuki! Finally, huh? What's going
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More informationきずなプロジェクト-表紙.indd
P6 P7 P12 P13 P20 P28 P76 P78 P80 P81 P88 P98 P138 P139 P140 P142 P144 P146 P148 #1 SHORT-TERM INVITATION GROUPS 2012 6 10 6 23 2012 7 17 14 2012 7 17 14 2012 7 8 7 21 2012 7 8 7 21 2012 8 7 8 18
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More information21 Quantum calculator simulator based on reversible operation
21 Quantum calculator simulator based on reversible operation 1100366 2010 3 1 i Abstract Quantum calculator simulator based on reversible operation Ryota Yoshimura Quantum computation is the novel computational
More information外国語科 ( 英語 Ⅱ) 学習指導案 A TOUR OF THE BRAIN ( 高等学校第 2 学年 ) 神奈川県立総合教育センター 平成 20 年度研究指定校共同研究事業 ( 高等学校 ) 授業改善の組織的な取組に向けて 平成 21 年 3 月 平成 20 年度研究指定校である光陵高等学校において 授業改善に向けた組織的な取組として授業実践を行った学習指導案です 生徒主体の活動を多く取り入れ 生徒の学習活動に変化をもたせるとともに
More informationGPGPU
GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the
More informationThe 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo
Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard 64 81 Magic Bitboard Magic Bitboard Bonanza Proposal and Implementation of Magic Bitboards in Shogi Issei Yamamoto, Shogo Takeuchi,
More informationNKK NEWS 2012
2012Spring 42 CONTROLS SINGLE POINT OF CONTROL (S.P.O.C.) Introduction / Index INDEX Module Versions: C / D BECAUSE CONTROL IS LOGIC! www.42controls.com Introduction... 2 Console Desktop Version... 3
More informationA comparison of abdominal versus vaginal hysterectomy for leiomyoma and adenomyosis Kenji ARAHORI, Hisasi KATAYAMA, Suminori NIOKA Department of Obstetrics and Gnecology, National Maizuru Hospital,Kyoto,
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More information西川町広報誌NETWORKにしかわ2011年1月号
NETWORK 2011 1 No.657 平 成 四 年 四 の 開 校 に 向 け て 家 庭 教 育 を 考 え よ う! Every year around the winter holiday the Japanese custom of cleaning out your office space is performed. Everyone gets together and cleans
More information189 2015 1 80
189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87
More information„h‹¤.05.07
Japanese Civilian Control in the Cold War Era Takeo MIYAMOTO In European and American democratic countries, the predominance of politics over military, i.e. civilian control, has been assumed as an axiom.
More informationSpecimenOTKozGo indd
TM The Kozuka Gothic TM typeface family is composed of six weights that cover various uses ranging from body text composition to headline compositions. This typeface family is now available in OpenType
More information千葉県における温泉地の地域的展開
1) 1999 11 50 1948 23) 2 2519 9 3) 2006 4) 151 47 37 1.2 l 40 3.6 15 240 21 9.2 l 7. 210 1972 5) 1.9 l 5 1 0.2 l 6 1 1972 1.9 0.4 210 40-17- 292006 34 6 l/min.42 6) 2006 1 1 2006 42 60% 5060 4050 3040
More information_念3)医療2009_夏.indd
Evaluation of the Social Benefits of the Regional Medical System Based on Land Price Information -A Hedonic Valuation of the Sense of Relief Provided by Health Care Facilities- Takuma Sugahara Ph.D. Abstract
More informationSport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be
Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship between broadcasting and sport (major sport and professional
More information,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki
More informationThe Key Questions about Today's "Experience Loss": Focusing on Provision Issues Gerald ARGENTON These last years, the educational discourse has been focusing on the "experience loss" problem and its consequences.
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More informationñ{ï 01-65
191252005.2 19 *1 *2 *3 19562000 45 10 10 Abstract A review of annual change in leading rice varieties for the 45 years between 1956 and 2000 in Japan yielded 10 leading varieties of non-glutinous lowland
More informationStudies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth
Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,
More information;~ (Summary) The Study on the Effects of Foot Bathing on Urination Kumiko Toyoda School of Human Nursing, University of Shiga Prefecture Background Foot bathing is one of the important nursing care for
More informationP
03-3208-22482013 Vol.2 Summer & Autumn 2013 Vol.2 Summer & Autumn 90 527 P.156 611 91 C O N T E N T S 2013 03-3208-2248 2 3 4 6 Information 7 8 9 10 2 115 154 10 43 52 61 156 158 160 161 163 79 114 1 2
More informationALT : Hello. May I help you? Student : Yes, please. I m looking for a white T-shirt. ALT : How about this one? Student : Well, this size is good. But do you have a cheaper one? ALT : All right. How about
More information840 Geographical Review of Japan 73A-12 835-854 2000 The Mechanism of Household Reproduction in the Fishing Community on Oro Island Masakazu YAMAUCHI (Graduate Student, Tokyo University) This
More informationIntroduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool
Introduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool for developing software for embedded systems that
More informationスライド 1
2010.2.18 CSS Nite in Ginza Vol.44 JIS X 8341-3 60 1 2004 vs 2010 2010 2 18 2010.2.18 CSS Nite in Ginza Vol.44 3 2004 10 Web Web JIS X 8341-3 W3C / WCAG 2010.2.18 CSS Nite in Ginza Vol.44 2010.2.18 CSS
More informationNO.80 2012.9.30 3
Fukuoka Women s University NO.80 2O12.9.30 CONTENTS 2 2 3 3 4 6 7 8 8 8 9 10 11 11 11 12 NO.80 2012.9.30 3 4 Fukuoka Women s University NO.80 2012.9.30 5 My Life in Japan Widchayapon SASISAKULPON (Ing)
More informationuntitled
Ministry of Land, Infrastructure, Transport and Tourism IATA 996 9 96 96 1180 11 11 80 80 27231 27 27231 231 H19.12.5 10 200612 20076 200710 20076 20086 11 20061192008630 12 20088 20045 13 113 20084
More information1 ( 8:12) Eccles. 1:8 2 2
1 http://www.hyuki.com/imit/ 1 1 ( 8:12) Eccles. 1:8 2 2 3 He to whom it becomes everything, who traces all things to it and who sees all things in it, may ease his heart and remain at peace with God.
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More information123-099_Y05…X…`…‘…“†[…h…•
1. 2 1993 2001 2 1 2 1 2 1 99 2009. 1982 250 251 1991 112 115 1988 75 2004 132 2006 73 3 100 3 4 1. 2. 3. 4. 5. 6.. 3.1 1991 2002 2004 3 4 101 2009 3 4 4 5 1 5 6 1 102 5 6 3.2 2 7 8 2 X Y Z Z X 103 2009
More informationHousing Purchase by Single Women in Tokyo Yoshilehl YUI* Recently some single women purchase their houses and the number of houses owned by single women are increasing in Tokyo. And their housing demands
More information16.16%
2017 (411824) 16.16% Abstract Multi-core processor is common technique for high computing performance. In many multi-core processor architectures, all processors share L2 and last level cache memory. Thus,
More information\615L\625\761\621\745\615\750\617\743\623\6075\614\616\615\606.PS
osakikamijima HIGH SCHOOL REPORT Hello everyone! I hope you are enjoying spring and all of the fun activities that come with warmer weather! Similar to Judy, my time here on Osakikamijima is
More information2
8 23 26A800032A8000 31 37 42 51 2 3 23 37 10 11 51 4 26 7 28 7 8 7 9 8 5 6 7 9 8 17 7 7 7 37 10 13 12 23 21 21 8 53 8 8 8 8 1 2 3 17 11 51 51 18 23 29 69 30 39 22 22 22 22 21 56 8 9 12 53 12 56 43 35 27
More information2
8 22 19A800022A8000 30 37 42 49 2 3 22 37 10 11 49 4 24 27 7 49 7 8 7 9 8 5 6 7 9 8 16 7 7 7 37 10 11 20 22 20 20 8 51 8 8 9 17 1 2 3 16 11 49 49 17 22 28 48 29 33 21 21 21 21 20 8 10 9 28 9 53 37 36 25
More information評論・社会科学 90号(よこ)(P)/4.咸
1 2008 7 1 1 4 5 1 1998 2003 2005 3 2 2008 7 1 2009 7 30 2009 11 18 2009 2009 2008 1 1 1 1 65 1970 3.1 2000 7.2 7 2008 10.7 14 2018 1 2 1985 41.92008 50.0 2004 15 59 2003 2010 79 2020 114 OECD 1 65 2006
More informationPage 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a
Page 1 of 6 B (The World of Mathematics) November 0, 006 Final Exam 006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (a) (Decide whether the following holds by completing the truth
More information10 2000 11 11 48 ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) CU-SeeMe NetMeeting Phoenix mini SeeMe Integrated Services Digital Network 64kbps 16kbps 128kbps 384kbps
More information2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last
1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan
More information先端社会研究 ★5★号/4.山崎
71 72 5 1 2005 7 8 47 14 2,379 2,440 1 2 3 2 73 4 3 1 4 1 5 1 5 8 3 2002 79 232 2 1999 249 265 74 5 3 5. 1 1 3. 1 1 2004 4. 1 23 2 75 52 5,000 2 500 250 250 125 3 1995 1998 76 5 1 2 1 100 2004 4 100 200
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More informationTo the Conference of District 2652 It is physically impossile for Mary Jane and me to attend the District Conferences around the world. As a result, we must use representatives for that purpose. I have
More informationHuawei G6-L22 QSG-V100R001_02
G6 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 1 2 3 17 4 5 18 UI 100% 8:08 19 100% 8:08 20 100% 8:08 21 100% 8:08 22 100% 8:08 ********** 23 100% 8:08 Happy birthday! 24 S S 25 100% 8:08 26 http://consumer.huawei.com/jp/
More informationR R S K K S K S K S K S K S Study of Samuhara Belief : Transformation from Protection against Injuries to Protection against Bullets WATANABE Kazuhiro Samuhara, which is a group of letters like unfamiliar
More informationABSTRACT The movement to increase the adult literacy rate in Nepal has been growing since democratization in 1990. In recent years, about 300,000 peop
Case Study Adult Literacy Education as an Entry Point for Community Empowerment The Evolution of Self-Help Group Activities in Rural Nepal Chizu SATO Masamine JIMBA, MD, PhD, MPH Izumi MURAKAMI, MPH Massachusetts
More informationSocial ecology is based on looking rather than on analysis It is based on perception This I submit distinguishes it what is normally meant by a science. It is not only that it can not be reductionist.
More information,
, The Big Change of Life Insurance Companies in Japan Hisayoshi TAKEDA Although the most important role of the life insurance system is to secure economic life of the insureds and their
More information生研ニュースNo.132
No.132 2011.10 REPORTS TOPICS Last year, the Public Relations Committee, General Affairs Section and Professor Tomoki Machida created the IIS introduction video in Japanese. As per the request from Director
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More informationZ7000操作編_本文.indb
2 8 17 37Z700042Z7000 46Z7000 28 42 52 61 72 87 2 3 12 13 6 7 3 4 11 21 34 61 8 17 4 11 4 53 12 12 10 75 18 12 42 42 13 30 42 42 42 42 10 62 66 44 55 14 25 9 62 65 23 72 23 19 24 42 8 26 8 9 9 4 11 18
More information内蔵ハードディスクユニット-20GB (PG-HD2E4H) 内蔵ハードディスクユニット-40GB (PG-HD4E4H)取扱説明書 HARD DISK DRIVE 20GB(PG-HD2E4H) HARD DISK DRIVE 40GB(PG-HD4E4H) USER'S GUIDE
B7FY-0351-02 J E J 1 J 1 2 3 2 4 J 3 4 Preface Thank you very much for purchasing the hard disk drive. This hard disk drive provides a IDE interface and can be installed in the 3.5-inch storage bay of
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More informationC. S2 X D. E.. (1) X S1 10 S2 X+S1 3 X+S S1S2 X+S1+S2 X S1 X+S S X+S2 X A. S1 2 a. b. c. d. e. 2
I. 200 2 II. ( 2001) 30 1992 Do X for S2 because S1(is not desirable) XS S2 A. S1 S2 B. S S2 S2 X 1 C. S2 X D. E.. (1) X 12 15 S1 10 S2 X+S1 3 X+S2 4 13 S1S2 X+S1+S2 X S1 X+S2. 2. 3.. S X+S2 X A. S1 2
More informationBodenheimer, Thomas S., and Kevin Grumbach (1998) Understanding Health Policy: A Clinical Approach, 2nd ed. Appleton & Lange. The Present State of Managed Care and the Feasibility of its Application to
More information2013 Vol.1 Spring 2013 Vol.1 SPRING 03-3208-2248 C O N T E N T S 2013 03-3208-2248 2 3 4 7 Information 6 8 9 11 10 73 94 11 32 37 41 96 98 100 101 103 55 72 1 2 201345135016151330 3 1 2 URL: http://www.wul.waseda.ac.jp/clib/tel.03-3203-5581
More information24_ChenGuang_final.indd
Abstract If rapid economic development is sure to bring hierarchical consumption (M. Ozawa), the solution can only be to give property to all of the people in the country. In China, economic development
More information6 1Bulletin of Tokyo University and Graduate School of Social Welfarepp73-86 2015, 10 372-0831 2020-1 2015 5 29 2015 7 9 : : : 1 A B C D E 4 A B A B A B A ] AB C D E 4 8 73 17 2 22 750 1 2 26 2 16 17 32
More information0
Speedy & Simple Kenji, Yoshio, and Goro are good at English. They have their ways of learning. Kenji often listens to English songs and tries to remember all the words. Yoshio reads one English book every
More informationfx-9860G Manager PLUS_J
fx-9860g J fx-9860g Manager PLUS http://edu.casio.jp k 1 k III 2 3 1. 2. 4 3. 4. 5 1. 2. 3. 4. 5. 1. 6 7 k 8 k 9 k 10 k 11 k k k 12 k k k 1 2 3 4 5 6 1 2 3 4 5 6 13 k 1 2 3 1 2 3 1 2 3 1 2 3 14 k a j.+-(),m1
More informationBy Kenji Kinoshita, I taru Fukuda, Taiji Ota A Study on the Use of Overseas Construction Materials There are not few things which are superior in the price and the aspect of the quality to a domestic
More information第16回ニュージェネレーション_cs4.indd
New Generation Tennis 2014 JPTA ALL JAPAN JUNIOR TENNIS TOURNAMENT U15U13 JPTA ALL JAPAN JUNIOR TENNIS TOURNAMENT U10 20142.21Fri 22Sat 20142.22Sat 23Sun Japan Professional Tennis Association New Generation
More information6 4 4 9RERE6RE 5 5 6 7 8 9 4 5 6 4 4 5 6 8 4 46 5 7 54 58 60 6 69 7 8 0 9 9 79 0 4 0 0 4 4 60 6 9 4 6 46 5 4 4 5 4 4 7 44 44 6 44 8 44 46 44 44 4 44 0 4 4 5 4 8 6 0 4 0 4 4 5 45 4 5 50 4 58 60 57 54
More information浜松医科大学紀要
On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse
More information2
8 23 32A950S 30 38 43 52 2 3 23 40 10 33 33 11 52 4 52 7 28 26 7 8 8 18 5 6 7 9 8 17 7 7 7 38 10 12 9 23 22 22 8 53 8 8 8 8 1 2 3 17 11 52 52 19 23 29 71 29 41 55 22 22 22 22 22 55 8 18 31 9 9 54 71 44
More informationS1Šû‘KŒâ‚è
are you? I m thirteen years old. do you study at home every day? I study after dinner. is your cat? It s under the table. I leave for school at seven in Monday. I leave for school at seven on Monday. I
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationA Contrastive Study of Japanese and Korean by Analyzing Mistranslation from Japanese into Korean Yukitoshi YUTANI Japanese, Korean, contrastive study, mistranslation, Japanese-Korean dictionary It is already
More informationHospitality-mae.indd
Hospitality on the Scene 15 Key Expressions Vocabulary Check PHASE 1 PHASE 2 Key Expressions A A Contents Unit 1 Transportation 2 Unit 2 At a Check-in Counter (hotel) 7 Unit 3 Facilities and Services (hotel)
More informationTitle 生活年令による学級の等質化に関する研究 (1) - 生活年令と学業成績について - Author(s) 与那嶺, 松助 ; 東江, 康治 Citation 研究集録 (5): 33-47 Issue Date 1961-12 URL http://hdl.handle.net/20.500.12000/ Rights 46 STUDIES ON HOMOGENEOUS
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationH8000操作編
8 26 35 32H800037H800042H8000 49 55 60 72 2 3 4 48 7 72 32 28 7 8 9 5 7 9 22 43 20 8 8 8 8 73 8 13 7 7 7 55 10 49 49 13 37 49 49 49 49 49 49 12 50 11 76 8 24 26 24 24 6 1 2 3 18 42 72 72 20 26 32 80 34
More information2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
More information49148
Research in Higher Education - Daigaku Ronshu No.24 (March 1995) 77 A Study of the Process of Establishing the Student Stipend System in the Early Years of the PRC Yutaka Otsuka* This paper aims at explicating
More informationSpecimenOTKozMin indd
Adobe Originals e Kozuka Mincho typeface family is composed of six weights that cover various uses ranging from body text composition to headline composition. is typeface family is now available in OpenType
More informationVisual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science,
Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science, Bunka Women's University, Shibuya-ku, Tokyo 151-8523
More informationJAPANESE SHIP-OWNERS AND WORLD BULK MARKET BETWEEN THE TWO WORLD WARS Mariko Tatsuki Keisen University After World War I, Japanese shipping suffered for a long time from an excess of tonnage and severe
More informationASP英語科目群ALE Active Learning in English No 7. What activity do you think is needed in ALE for students to improve student s English ability? active listening a set of important words before every lecture
More informationTab 5, 11 Tab 4, 10, Tab 3, 9, 15Tab 2, 8, 14 Tab 1, 7, 13 2
COMPANION 20 MULTIMEDIA SPEAKER SYSTEM Owner s Guide Tab 5, 11 Tab 4, 10, Tab 3, 9, 15Tab 2, 8, 14 Tab 1, 7, 13 2 Tab1, 7, 13 Tab 2, 8, 14 Tab 3, 9, 15 Tab 4, 10, Tab 5, 11 This product conforms to all
More information3
2 3 CONTENTS... 2 Introduction JAPANESE... 6... 7... 8... 9 ENGLISH About Shadowing... 10 Organization of the book... 11 Features of the text... 12 To students using this book... 13 CHINESE... 14... 15...
More informationOn the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new e
On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new electric wave projector is proposed in this paper. The
More information43 + +* / +3+0,, 22*,, ++..0/ / 1/. / / + /* *,* +* *.* /* 0 +0 2*,/./ +3+,. + : / 3 / +** +**, // /. /+ /+ + * * + +2 +2 +3,* 3 3 ++ +, 0.. /3 : +/,.
42 * :. +, / /0/ ha, +. 2, 2ha. + : :, / /0/ +3,2. 2 / * 43 + +* / +3+0,, 22*,, ++..0/ / 1/. / / + /* *,* +* *.* /* 0 +0 2*,/./ +3+,. + : / 3 / +** +**, // /. /+ /+ + * * + +2 +2 +3,* 3 3 ++ +, 0.. /3
More information041-057_’¼Œì
542012 4157 Nishino Toshiaki The purpose of this paper is to analyze the present conditions of the mountain villages of Japan in the early 21 st century. The revolution of fuel sources from a predominance
More information2
8 24 32C800037C800042C8000 32 40 45 54 2 3 24 40 10 11 54 4 7 54 30 26 7 9 8 5 6 7 9 8 18 7 7 7 40 10 13 12 24 22 22 8 55 8 8 8 8 1 2 3 18 11 54 54 19 24 30 69 31 40 57 23 23 22 23 22 57 8 9 30 12 12 56
More informationuntitled
TZ-BDT910M TZ-BDT910F TZ-BDT910P μ μ μ μ TM VQT3F51-1 l l l [HDD] [BD-RE] [BD-R] [DVD-V] [BD-V] [RAM] [CD] [SD] [-R] [USB] [-RW] [RAM AVCREC ] [-R AVCREC ] [RAM VR ][-R VR ] [-RW VR ] [-R V ] [-RW
More information鹿大広報149号
No.149 Feb/1999 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Learned From Japanese Life and Experiences in Kagoshima When I first came to Japan I was really surprised by almost everything, the weather,
More information環境影響評価制度をめぐる法的諸問題(4) : 米国の環境影響評価制度について
Kwansei Gakuin University Rep Title Author(s) 環 境 影 響 評 価 制 度 をめぐる 法 的 諸 問 題 (4) : 米 国 の 環 境 影 響 評 価 制 度 について Sekine, Takamichi, 関 根, 孝 道 Citation 総 合 政 策 研 究, 33: 73-103 Issue Date 2010-02-20 URL http://hdl.handle.net/10236/3583
More information