titre de la présentation

Size: px
Start display at page:

Download "titre de la présentation"

Transcription

1 Low Cost Cryptography Matt Robshaw Orange Labs France Orange Labs

2 Cryptography in a Nutshell Cryptography provides the foundation to many security solutions Algorithms can be divided into two classes Symmetric: participants share the same key material Asymmetric: participants use different key material You can (almost) do everything you want with either The important differences are in the supporting infrastructure This can make one type more suitable than another Low Cost Cryptogrpahy Matt Robshaw (2) Orange Labs

3 Low Cost Applications There is much interest in low cost cryptography RFID tags, sensor networks, ubiquitous computing We might want to authenticate a device; e.g. anti-cloning in an RFID tag We might want to authenticate information between devices; e.g. information sent from sensor tags We are probably less interested in encryption There may be specific issues; e.g. re-keying Low Cost Cryptogrpahy Matt Robshaw (3) Orange Labs

4 Cryptographic Performance In general we rarely care about performance But it is important for restricted hardware applications What do we mean by performance? Speed of operation? Speed of operation with different keys? Physical space in hardware? Power consumption? "Is this algorithm the best?" not a good question A better question is "Is this algorithm good enough?" e.g. 12% faster than the AES is probably not that interesting Low Cost Cryptogrpahy Matt Robshaw (4) Orange Labs

5 Requirements For low-cost applications we're interested in a small footprint in hardware a low average and peak power consumption Often we are willing to make some compromises we might be willing to sacrifice speed up to some limit we might be willing to trade security e.g operations is probably reasonable Low Cost Cryptogrpahy Matt Robshaw (5) Orange Labs

6 Space Requirements The space depends on the "state" and the "operations" The size of the state depends on the security level Block cipher: n-bit block leads to 2 n/2 distinguishing attack Stream cipher: n-bit state leads to 2 n/2 state recovery attack There are various Time/Memory/Data trade-offs Operations (and hence algorithm implementations) can be compared using the notion of gate equivalents (GE) Low Cost Cryptogrpahy Matt Robshaw (6) Orange Labs

7 Disclaimer Performance figures in this presentation are indicative! Hardware implementations can explore many trade-offs Implementations may use different technologies and be optimised with regards to different metrics However, the general capabilities of an algorithm (and its class/type) should be reasonably apparent Low Cost Cryptogrpahy Matt Robshaw (7) Orange Labs

8 Block Ciphers Can be used for authentication or encryption Device authentication via a challenge-response protocol Data authentication via a MAC Data encryption in some encryption mode The state-of-the-art is very advanced Low Cost Cryptogrpahy Matt Robshaw (8) Orange Labs

9 Relative Sizes (encrypt-only) GE Key Size Block Size KASUMI AES HIGHT mcrypton DES SEA DESXL TEA XTEA PRESENT Low Cost Cryptogrpahy Matt Robshaw (9) Orange Labs

10 PRESENT (CHES 2007) Collaborative design between FTRD, DTU, and Bochum Designed from scratch to be hardware-efficient Based on the design of Serpent The most hardware efficient of the AES finalists SPN (substitution-permutation-network) Very simple design that allows Good implementation trade-offs Basic, but sound, security assessment Low Cost Cryptogrpahy Matt Robshaw (10) Orange Labs

11 PRESENT (CHES 2007) Low Cost Cryptogrpahy Matt Robshaw (11) Orange Labs

12 PRESENT (CHES 2007) The breakdown of space requirements is as follows GE % GE % Data state KS state S-layer KS S-box P-layer 0 0 KS Rotation 0 0 Counter: state KS Counter xor Counter: combin Other Key xor Low Cost Cryptogrpahy Matt Robshaw (12) Orange Labs

13 PRESENT (CHES 2007) The 4-bit S-box can be implemented in 28 GE Satisfies good cryptographic properties Compare to 4-bit S-box in mcrypton which requires 107 GE AES S-box requires 395 GE (Anubis S-box requires 120 GE) Basic differential or linear cryptanalysis needs > 2 64 text Algebraic attacks a potential concern PRESENT consists of 11,067 quadratic equations in 4,216 variables Small-scale experiments quickly run out of memory and time Low Cost Cryptogrpahy Matt Robshaw (13) Orange Labs

14 Block / Stream Ciphers Are stream ciphers necessarily more compact than block ciphers? Low Cost Cryptogrpahy Matt Robshaw (14) Orange Labs

15 Stream Ciphers The reputation of stream ciphers is that they are faster and lighter than block ciphers Commercially, stream ciphers are widely used Many proprietary designs consist of shift register arrays These can lend themselves to efficient implementation However the stream ciphers in general use are large The estream project is attempting to address this Low Cost Cryptogrpahy Matt Robshaw (15) Orange Labs

16 estream estream is a multi-year project to promote stream cipher research Submissions were invited for two profiles 1. Fast performance in software 2. Resource-efficient in constrained hardware environments We are now in the last year with the 34 original entries reduced to eight in each profile Low Cost Cryptogrpahy Matt Robshaw (16) Orange Labs

17 estream The final eight Profile 2 (hardware) candidates are DECIM v2 Edon-80 F-FCSR-H v2 Grain v1 MICKEY v2 MOUSTIQUE POMARANCH v3 Trivium Low Cost Cryptogrpahy Matt Robshaw (17) Orange Labs

18 Relative Sizes (rough guide in GE) GE Notes SNOW ISO standardised RC Widely used (e.g. TLS) A5/ Ill-fated GSM encryption algorithm QUAD 3700 Some element of provable security DECIM v estream (Profile II) Edon estream (Profile II) F-FCSR-H 3200 estream (Profile II) Grain v estream (Profile II) MICKEY v estream (Profile II) POMARANCH v estream (Profile II) Trivium 1500 estream (Profile II) Low Cost Cryptogrpahy Matt Robshaw (18) Orange Labs

19 Asymmetric Algorithms Generally speaking asymmetric cryptography is heavier than symmetric cryptography "Anyway, public-key cryptography is too heavy to be implemented within low cost tags. Thus we only deal with tags [ ] capable of using symmetric cryptography." [Avoine, 2005] However the GPS identification scheme shows that this is not necessarily the case Low Cost Cryptogrpahy Matt Robshaw (19) Orange Labs

20 Relative Sizes (rough guide in GE) GE Cycles Notes ECC (p 166 ) ECC ( p 192 ) ECC (p 100 ) ECC (2 67 ) For use in EC Schnorr ID NTRU (encrypt) GPS ID scheme Uses coupons Excellent article at Complete on-tag GPS has been realised in 2000 GE Low Cost Cryptogrpahy Matt Robshaw (20) Orange Labs

21 GPS Identification Scheme Due to Girault, Poupard, and Stern ISO Standardised Also listed in the final NESSIE portfolio Can be based on RSA-like moduli or ECC There is a wide range of optimisations In the most interesting embodiment we use coupons With coupons the on-tag computation is an integer addition Low Cost Cryptogrpahy Matt Robshaw (21) Orange Labs

22 GPS in Practice Secret key s TAG READER Public key V = -sg Choose r Compute x = hash(rg) x c Choose c Compute y = r + sc verify x = hash( yg + cv) Low Cost Cryptogrpahy Matt Robshaw (22) Orange Labs

23 GPS in Practice Choose r i Compute x i = hash(r i G) Store coupon (r i, x i ) Secret key s TAG READER Public key V = -sg Choose coupon (r i, x i ) x i c Choose c Compute y = r i + sc verify x i = hash( yg + cv) Low Cost Cryptogrpahy Matt Robshaw (23) Orange Labs

24 GPS Computation Use Advanced Encryption Standard (AES) as a benchmark Space Current Time Time (Gates) (μamps) (Clock cycles) (Seconds) AES ms GPS ms GPS (LHW) ms GPS (LHW) ms change the clock frequency Low Cost Cryptogrpahy Matt Robshaw (24) Orange Labs

25 GPS Ongoing Work Implementation requires additional memory and logic Fully-functioning variants require around 2000 GE The use of coupons has an impact on the applications This requires a limited number of uses per tag Compatible with many RFID-applications: use infrequently and throw away Low Cost Cryptogrpahy Matt Robshaw (25) Orange Labs

26 Fundamental Issues (1) Do we need security? Do we need cryptographic security? EPCglobal develops industry standards The kill command renders the tag inoperable Many security threats are prevented; e.g. tracking a tag Other security features include strong audit trails For many applications basic solutions are sufficient! But not all Low Cost Cryptogrpahy Matt Robshaw (26) Orange Labs

27 Fundamental Issues (2) What about Moore's Law? The number of transistors at minimum component cost doubles roughly every 18 months A relaxed version might be every two years Will Moore's Law come to our aid? Low Cost Cryptogrpahy Matt Robshaw (27) Orange Labs

28 Fundamental Issues (2) GE Threshold GE for most crypto Target GE today Year Moore's Law Relaxed Moore's Law Low Cost Cryptogrpahy Matt Robshaw (28) Orange Labs

29 Fundamental Issues (2) There are two schools of thought #1: There will always be a need for the cheapest, smallest solution #2: Provided the price / functionality of a "large" solution is acceptable, there will be no need to take a smaller one Low Cost Cryptogrpahy Matt Robshaw (29) Orange Labs

30 Summary (rough guide in GE) SNOW 2.0 AES RC4 DES Established Stream Ciphers Established Block Ciphers Dedicated stream ciphers estream Dedicated block ciphers Various sources SHA WPI SHA MD5 [MD4] 8001 [7350] TU Graz ECC k Various sources GPS 2000 FTRD Low Cost Cryptogrpahy Matt Robshaw (30) Orange Labs

31 Conclusions New application areas bring new security challenges Low cost cryptography is a very active research area Contrary to popular belief, stream ciphers are not intrinsically better-suited than block ciphers Contrary to popular belief, there are public key techniques that are suitable for constrained environments Low Cost Cryptogrpahy Matt Robshaw (31) Orange Labs

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

2

2 2011 8 6 2011 5 7 [1] 1 2 i ii iii i 3 [2] 4 5 ii 6 7 iii 8 [3] 9 10 11 cf. Abstracts in English In terms of democracy, the patience and the kindness Tohoku people have shown will be dealt with as an exception.

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th

Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai shiho@isl.ntt.co.jp NTT Laboratories 128-bit Block Cipher Camellia Kazumaro Aoki * Tetsuya Ichikawa Masayuki

More information

L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? Well,/ you re very serious person/ so/ I think/ your blood type is A. Wow!/ G

L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? Well,/ you re very serious person/ so/ I think/ your blood type is A. Wow!/ G L1 What Can You Blood Type Tell Us? Part 1 Can you guess/ my blood type? 当ててみて / 私の血液型を Well,/ you re very serious person/ so/ I think/ your blood type is A. えーと / あなたはとっても真面目な人 / だから / 私は ~ と思います / あなたの血液型は

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087

More information

はじめに

はじめに IT 1 NPO (IPEC) 55.7 29.5 Web TOEIC Nice to meet you. How are you doing? 1 type (2002 5 )66 15 1 IT Java (IZUMA, Tsuyuki) James Robinson James James James Oh, YOU are Tsuyuki! Finally, huh? What's going

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

きずなプロジェクト-表紙.indd

きずなプロジェクト-表紙.indd P6 P7 P12 P13 P20 P28 P76 P78 P80 P81 P88 P98 P138 P139 P140 P142 P144 P146 P148 #1 SHORT-TERM INVITATION GROUPS 2012 6 10 6 23 2012 7 17 14 2012 7 17 14 2012 7 8 7 21 2012 7 8 7 21 2012 8 7 8 18

More information

大学における原価計算教育の現状と課題

大学における原価計算教育の現状と課題 1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012

More information

21 Quantum calculator simulator based on reversible operation

21 Quantum calculator simulator based on reversible operation 21 Quantum calculator simulator based on reversible operation 1100366 2010 3 1 i Abstract Quantum calculator simulator based on reversible operation Ryota Yoshimura Quantum computation is the novel computational

More information

外国語科 ( 英語 Ⅱ) 学習指導案 A TOUR OF THE BRAIN ( 高等学校第 2 学年 ) 神奈川県立総合教育センター 平成 20 年度研究指定校共同研究事業 ( 高等学校 ) 授業改善の組織的な取組に向けて 平成 21 年 3 月 平成 20 年度研究指定校である光陵高等学校において 授業改善に向けた組織的な取組として授業実践を行った学習指導案です 生徒主体の活動を多く取り入れ 生徒の学習活動に変化をもたせるとともに

More information

GPGPU

GPGPU GPGPU 2013 1008 2015 1 23 Abstract In recent years, with the advance of microscope technology, the alive cells have been able to observe. On the other hand, from the standpoint of image processing, the

More information

The 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo

The 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard 64 81 Magic Bitboard Magic Bitboard Bonanza Proposal and Implementation of Magic Bitboards in Shogi Issei Yamamoto, Shogo Takeuchi,

More information

NKK NEWS 2012

NKK NEWS 2012 2012Spring 42 CONTROLS SINGLE POINT OF CONTROL (S.P.O.C.) Introduction / Index INDEX Module Versions: C / D BECAUSE CONTROL IS LOGIC! www.42controls.com Introduction... 2 Console Desktop Version... 3

More information

A comparison of abdominal versus vaginal hysterectomy for leiomyoma and adenomyosis Kenji ARAHORI, Hisasi KATAYAMA, Suminori NIOKA Department of Obstetrics and Gnecology, National Maizuru Hospital,Kyoto,

More information

16_.....E...._.I.v2006

16_.....E...._.I.v2006 55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

西川町広報誌NETWORKにしかわ2011年1月号

西川町広報誌NETWORKにしかわ2011年1月号 NETWORK 2011 1 No.657 平 成 四 年 四 の 開 校 に 向 け て 家 庭 教 育 を 考 え よ う! Every year around the winter holiday the Japanese custom of cleaning out your office space is performed. Everyone gets together and cleans

More information

189 2015 1 80

189 2015 1 80 189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87

More information

„h‹¤.05.07

„h‹¤.05.07 Japanese Civilian Control in the Cold War Era Takeo MIYAMOTO In European and American democratic countries, the predominance of politics over military, i.e. civilian control, has been assumed as an axiom.

More information

SpecimenOTKozGo indd

SpecimenOTKozGo indd TM The Kozuka Gothic TM typeface family is composed of six weights that cover various uses ranging from body text composition to headline compositions. This typeface family is now available in OpenType

More information

千葉県における温泉地の地域的展開

千葉県における温泉地の地域的展開 1) 1999 11 50 1948 23) 2 2519 9 3) 2006 4) 151 47 37 1.2 l 40 3.6 15 240 21 9.2 l 7. 210 1972 5) 1.9 l 5 1 0.2 l 6 1 1972 1.9 0.4 210 40-17- 292006 34 6 l/min.42 6) 2006 1 1 2006 42 60% 5060 4050 3040

More information

_念3)医療2009_夏.indd

_念3)医療2009_夏.indd Evaluation of the Social Benefits of the Regional Medical System Based on Land Price Information -A Hedonic Valuation of the Sense of Relief Provided by Health Care Facilities- Takuma Sugahara Ph.D. Abstract

More information

Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be

Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship be Sport and the Media: The Close Relationship between Sport and Broadcasting SUDO, Haruo1) Abstract This report tries to demonstrate the relationship between broadcasting and sport (major sport and professional

More information

,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki

More information

The Key Questions about Today's "Experience Loss": Focusing on Provision Issues Gerald ARGENTON These last years, the educational discourse has been focusing on the "experience loss" problem and its consequences.

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

ñ{ï 01-65

ñ{ï 01-65 191252005.2 19 *1 *2 *3 19562000 45 10 10 Abstract A review of annual change in leading rice varieties for the 45 years between 1956 and 2000 in Japan yielded 10 leading varieties of non-glutinous lowland

More information

Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth

Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,

More information

;~ (Summary) The Study on the Effects of Foot Bathing on Urination Kumiko Toyoda School of Human Nursing, University of Shiga Prefecture Background Foot bathing is one of the important nursing care for

More information

P

P 03-3208-22482013 Vol.2 Summer & Autumn 2013 Vol.2 Summer & Autumn 90 527 P.156 611 91 C O N T E N T S 2013 03-3208-2248 2 3 4 6 Information 7 8 9 10 2 115 154 10 43 52 61 156 158 160 161 163 79 114 1 2

More information

ALT : Hello. May I help you? Student : Yes, please. I m looking for a white T-shirt. ALT : How about this one? Student : Well, this size is good. But do you have a cheaper one? ALT : All right. How about

More information

840 Geographical Review of Japan 73A-12 835-854 2000 The Mechanism of Household Reproduction in the Fishing Community on Oro Island Masakazu YAMAUCHI (Graduate Student, Tokyo University) This

More information

Introduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool

Introduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool Introduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool for developing software for embedded systems that

More information

スライド 1

スライド 1 2010.2.18 CSS Nite in Ginza Vol.44 JIS X 8341-3 60 1 2004 vs 2010 2010 2 18 2010.2.18 CSS Nite in Ginza Vol.44 3 2004 10 Web Web JIS X 8341-3 W3C / WCAG 2010.2.18 CSS Nite in Ginza Vol.44 2010.2.18 CSS

More information

NO.80 2012.9.30 3

NO.80 2012.9.30 3 Fukuoka Women s University NO.80 2O12.9.30 CONTENTS 2 2 3 3 4 6 7 8 8 8 9 10 11 11 11 12 NO.80 2012.9.30 3 4 Fukuoka Women s University NO.80 2012.9.30 5 My Life in Japan Widchayapon SASISAKULPON (Ing)

More information

untitled

untitled Ministry of Land, Infrastructure, Transport and Tourism IATA 996 9 96 96 1180 11 11 80 80 27231 27 27231 231 H19.12.5 10 200612 20076 200710 20076 20086 11 20061192008630 12 20088 20045 13 113 20084

More information

1 ( 8:12) Eccles. 1:8 2 2

1 ( 8:12) Eccles. 1:8 2 2 1 http://www.hyuki.com/imit/ 1 1 ( 8:12) Eccles. 1:8 2 2 3 He to whom it becomes everything, who traces all things to it and who sees all things in it, may ease his heart and remain at peace with God.

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

123-099_Y05…X…`…‘…“†[…h…•

123-099_Y05…X…`…‘…“†[…h…• 1. 2 1993 2001 2 1 2 1 2 1 99 2009. 1982 250 251 1991 112 115 1988 75 2004 132 2006 73 3 100 3 4 1. 2. 3. 4. 5. 6.. 3.1 1991 2002 2004 3 4 101 2009 3 4 4 5 1 5 6 1 102 5 6 3.2 2 7 8 2 X Y Z Z X 103 2009

More information

Housing Purchase by Single Women in Tokyo Yoshilehl YUI* Recently some single women purchase their houses and the number of houses owned by single women are increasing in Tokyo. And their housing demands

More information

16.16%

16.16% 2017 (411824) 16.16% Abstract Multi-core processor is common technique for high computing performance. In many multi-core processor architectures, all processors share L2 and last level cache memory. Thus,

More information

\615L\625\761\621\745\615\750\617\743\623\6075\614\616\615\606.PS

\615L\625\761\621\745\615\750\617\743\623\6075\614\616\615\606.PS osakikamijima HIGH SCHOOL REPORT Hello everyone! I hope you are enjoying spring and all of the fun activities that come with warmer weather! Similar to Judy, my time here on Osakikamijima is

More information

2

2 8 23 26A800032A8000 31 37 42 51 2 3 23 37 10 11 51 4 26 7 28 7 8 7 9 8 5 6 7 9 8 17 7 7 7 37 10 13 12 23 21 21 8 53 8 8 8 8 1 2 3 17 11 51 51 18 23 29 69 30 39 22 22 22 22 21 56 8 9 12 53 12 56 43 35 27

More information

2

2 8 22 19A800022A8000 30 37 42 49 2 3 22 37 10 11 49 4 24 27 7 49 7 8 7 9 8 5 6 7 9 8 16 7 7 7 37 10 11 20 22 20 20 8 51 8 8 9 17 1 2 3 16 11 49 49 17 22 28 48 29 33 21 21 21 21 20 8 10 9 28 9 53 37 36 25

More information

評論・社会科学 90号(よこ)(P)/4.咸

評論・社会科学 90号(よこ)(P)/4.咸 1 2008 7 1 1 4 5 1 1998 2003 2005 3 2 2008 7 1 2009 7 30 2009 11 18 2009 2009 2008 1 1 1 1 65 1970 3.1 2000 7.2 7 2008 10.7 14 2018 1 2 1985 41.92008 50.0 2004 15 59 2003 2010 79 2020 114 OECD 1 65 2006

More information

Page 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a

Page 1 of 6 B (The World of Mathematics) November 20, 2006 Final Exam 2006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (10pts) (a Page 1 of 6 B (The World of Mathematics) November 0, 006 Final Exam 006 Division: ID#: Name: 1. p, q, r (Let p, q, r are propositions. ) (a) (Decide whether the following holds by completing the truth

More information

10 2000 11 11 48 ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) CU-SeeMe NetMeeting Phoenix mini SeeMe Integrated Services Digital Network 64kbps 16kbps 128kbps 384kbps

More information

2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last

2 except for a female subordinate in work. Using personal name with SAN/KUN will make the distance with speech partner closer than using titles. Last 1 北陸大学 紀要 第33号 2009 pp. 173 186 原著論文 バーチャル世界における呼びかけ語の コミュニケーション機能 ポライトネス理論の観点からの考察 劉 艶 The Communication Function of Vocative Terms in Virtual Communication: from the Viewpoint of Politeness Theory Yan

More information

先端社会研究 ★5★号/4.山崎

先端社会研究 ★5★号/4.山崎 71 72 5 1 2005 7 8 47 14 2,379 2,440 1 2 3 2 73 4 3 1 4 1 5 1 5 8 3 2002 79 232 2 1999 249 265 74 5 3 5. 1 1 3. 1 1 2004 4. 1 23 2 75 52 5,000 2 500 250 250 125 3 1995 1998 76 5 1 2 1 100 2004 4 100 200

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

To the Conference of District 2652 It is physically impossile for Mary Jane and me to attend the District Conferences around the world. As a result, we must use representatives for that purpose. I have

More information

Huawei G6-L22 QSG-V100R001_02

Huawei  G6-L22 QSG-V100R001_02 G6 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 1 2 3 17 4 5 18 UI 100% 8:08 19 100% 8:08 20 100% 8:08 21 100% 8:08 22 100% 8:08 ********** 23 100% 8:08 Happy birthday! 24 S S 25 100% 8:08 26 http://consumer.huawei.com/jp/

More information

R R S K K S K S K S K S K S Study of Samuhara Belief : Transformation from Protection against Injuries to Protection against Bullets WATANABE Kazuhiro Samuhara, which is a group of letters like unfamiliar

More information

ABSTRACT The movement to increase the adult literacy rate in Nepal has been growing since democratization in 1990. In recent years, about 300,000 peop

ABSTRACT The movement to increase the adult literacy rate in Nepal has been growing since democratization in 1990. In recent years, about 300,000 peop Case Study Adult Literacy Education as an Entry Point for Community Empowerment The Evolution of Self-Help Group Activities in Rural Nepal Chizu SATO Masamine JIMBA, MD, PhD, MPH Izumi MURAKAMI, MPH Massachusetts

More information

Social ecology is based on looking rather than on analysis It is based on perception This I submit distinguishes it what is normally meant by a science. It is not only that it can not be reductionist.

More information

,

, , The Big Change of Life Insurance Companies in Japan Hisayoshi TAKEDA Although the most important role of the life insurance system is to secure economic life of the insureds and their

More information

生研ニュースNo.132

生研ニュースNo.132 No.132 2011.10 REPORTS TOPICS Last year, the Public Relations Committee, General Affairs Section and Professor Tomoki Machida created the IIS introduction video in Japanese. As per the request from Director

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

Z7000操作編_本文.indb

Z7000操作編_本文.indb 2 8 17 37Z700042Z7000 46Z7000 28 42 52 61 72 87 2 3 12 13 6 7 3 4 11 21 34 61 8 17 4 11 4 53 12 12 10 75 18 12 42 42 13 30 42 42 42 42 10 62 66 44 55 14 25 9 62 65 23 72 23 19 24 42 8 26 8 9 9 4 11 18

More information

内蔵ハードディスクユニット-20GB (PG-HD2E4H) 内蔵ハードディスクユニット-40GB (PG-HD4E4H)取扱説明書 HARD DISK DRIVE 20GB(PG-HD2E4H) HARD DISK DRIVE 40GB(PG-HD4E4H) USER'S GUIDE

内蔵ハードディスクユニット-20GB (PG-HD2E4H) 内蔵ハードディスクユニット-40GB (PG-HD4E4H)取扱説明書 HARD DISK DRIVE 20GB(PG-HD2E4H)  HARD DISK DRIVE 40GB(PG-HD4E4H) USER'S GUIDE B7FY-0351-02 J E J 1 J 1 2 3 2 4 J 3 4 Preface Thank you very much for purchasing the hard disk drive. This hard disk drive provides a IDE interface and can be installed in the 3.5-inch storage bay of

More information

4.1 % 7.5 %

4.1 % 7.5 % 2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel

More information

C. S2 X D. E.. (1) X S1 10 S2 X+S1 3 X+S S1S2 X+S1+S2 X S1 X+S S X+S2 X A. S1 2 a. b. c. d. e. 2

C. S2 X D. E.. (1) X S1 10 S2 X+S1 3 X+S S1S2 X+S1+S2 X S1 X+S S X+S2 X A. S1 2 a. b. c. d. e. 2 I. 200 2 II. ( 2001) 30 1992 Do X for S2 because S1(is not desirable) XS S2 A. S1 S2 B. S S2 S2 X 1 C. S2 X D. E.. (1) X 12 15 S1 10 S2 X+S1 3 X+S2 4 13 S1S2 X+S1+S2 X S1 X+S2. 2. 3.. S X+S2 X A. S1 2

More information

Bodenheimer, Thomas S., and Kevin Grumbach (1998) Understanding Health Policy: A Clinical Approach, 2nd ed. Appleton & Lange. The Present State of Managed Care and the Feasibility of its Application to

More information

2013 Vol.1 Spring 2013 Vol.1 SPRING 03-3208-2248 C O N T E N T S 2013 03-3208-2248 2 3 4 7 Information 6 8 9 11 10 73 94 11 32 37 41 96 98 100 101 103 55 72 1 2 201345135016151330 3 1 2 URL: http://www.wul.waseda.ac.jp/clib/tel.03-3203-5581

More information

24_ChenGuang_final.indd

24_ChenGuang_final.indd Abstract If rapid economic development is sure to bring hierarchical consumption (M. Ozawa), the solution can only be to give property to all of the people in the country. In China, economic development

More information

6 1Bulletin of Tokyo University and Graduate School of Social Welfarepp73-86 2015, 10 372-0831 2020-1 2015 5 29 2015 7 9 : : : 1 A B C D E 4 A B A B A B A ] AB C D E 4 8 73 17 2 22 750 1 2 26 2 16 17 32

More information

0 Speedy & Simple Kenji, Yoshio, and Goro are good at English. They have their ways of learning. Kenji often listens to English songs and tries to remember all the words. Yoshio reads one English book every

More information

fx-9860G Manager PLUS_J

fx-9860G Manager PLUS_J fx-9860g J fx-9860g Manager PLUS http://edu.casio.jp k 1 k III 2 3 1. 2. 4 3. 4. 5 1. 2. 3. 4. 5. 1. 6 7 k 8 k 9 k 10 k 11 k k k 12 k k k 1 2 3 4 5 6 1 2 3 4 5 6 13 k 1 2 3 1 2 3 1 2 3 1 2 3 14 k a j.+-(),m1

More information

By Kenji Kinoshita, I taru Fukuda, Taiji Ota A Study on the Use of Overseas Construction Materials There are not few things which are superior in the price and the aspect of the quality to a domestic

More information

第16回ニュージェネレーション_cs4.indd

第16回ニュージェネレーション_cs4.indd New Generation Tennis 2014 JPTA ALL JAPAN JUNIOR TENNIS TOURNAMENT U15U13 JPTA ALL JAPAN JUNIOR TENNIS TOURNAMENT U10 20142.21Fri 22Sat 20142.22Sat 23Sun Japan Professional Tennis Association New Generation

More information

6 4 4 9RERE6RE 5 5 6 7 8 9 4 5 6 4 4 5 6 8 4 46 5 7 54 58 60 6 69 7 8 0 9 9 79 0 4 0 0 4 4 60 6 9 4 6 46 5 4 4 5 4 4 7 44 44 6 44 8 44 46 44 44 4 44 0 4 4 5 4 8 6 0 4 0 4 4 5 45 4 5 50 4 58 60 57 54

More information

浜松医科大学紀要

浜松医科大学紀要 On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse

More information

2

2 8 23 32A950S 30 38 43 52 2 3 23 40 10 33 33 11 52 4 52 7 28 26 7 8 8 18 5 6 7 9 8 17 7 7 7 38 10 12 9 23 22 22 8 53 8 8 8 8 1 2 3 17 11 52 52 19 23 29 71 29 41 55 22 22 22 22 22 55 8 18 31 9 9 54 71 44

More information

S1Šû‘KŒâ‚è

S1Šû‘KŒâ‚è are you? I m thirteen years old. do you study at home every day? I study after dinner. is your cat? It s under the table. I leave for school at seven in Monday. I leave for school at seven on Monday. I

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

A Contrastive Study of Japanese and Korean by Analyzing Mistranslation from Japanese into Korean Yukitoshi YUTANI Japanese, Korean, contrastive study, mistranslation, Japanese-Korean dictionary It is already

More information

Hospitality-mae.indd

Hospitality-mae.indd Hospitality on the Scene 15 Key Expressions Vocabulary Check PHASE 1 PHASE 2 Key Expressions A A Contents Unit 1 Transportation 2 Unit 2 At a Check-in Counter (hotel) 7 Unit 3 Facilities and Services (hotel)

More information

Title 生活年令による学級の等質化に関する研究 (1) - 生活年令と学業成績について - Author(s) 与那嶺, 松助 ; 東江, 康治 Citation 研究集録 (5): 33-47 Issue Date 1961-12 URL http://hdl.handle.net/20.500.12000/ Rights 46 STUDIES ON HOMOGENEOUS

More information

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment

28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,

More information

H8000操作編

H8000操作編 8 26 35 32H800037H800042H8000 49 55 60 72 2 3 4 48 7 72 32 28 7 8 9 5 7 9 22 43 20 8 8 8 8 73 8 13 7 7 7 55 10 49 49 13 37 49 49 49 49 49 49 12 50 11 76 8 24 26 24 24 6 1 2 3 18 42 72 72 20 26 32 80 34

More information

2017 (413812)

2017 (413812) 2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has

More information

49148

49148 Research in Higher Education - Daigaku Ronshu No.24 (March 1995) 77 A Study of the Process of Establishing the Student Stipend System in the Early Years of the PRC Yutaka Otsuka* This paper aims at explicating

More information

SpecimenOTKozMin indd

SpecimenOTKozMin indd Adobe Originals e Kozuka Mincho typeface family is composed of six weights that cover various uses ranging from body text composition to headline composition. is typeface family is now available in OpenType

More information

Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science,

Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science, Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science, Bunka Women's University, Shibuya-ku, Tokyo 151-8523

More information

JAPANESE SHIP-OWNERS AND WORLD BULK MARKET BETWEEN THE TWO WORLD WARS Mariko Tatsuki Keisen University After World War I, Japanese shipping suffered for a long time from an excess of tonnage and severe

More information

ASP英語科目群ALE Active Learning in English No 7. What activity do you think is needed in ALE for students to improve student s English ability? active listening a set of important words before every lecture

More information

Tab 5, 11 Tab 4, 10, Tab 3, 9, 15Tab 2, 8, 14 Tab 1, 7, 13 2

Tab 5, 11 Tab 4, 10, Tab 3, 9, 15Tab 2, 8, 14 Tab 1, 7, 13 2 COMPANION 20 MULTIMEDIA SPEAKER SYSTEM Owner s Guide Tab 5, 11 Tab 4, 10, Tab 3, 9, 15Tab 2, 8, 14 Tab 1, 7, 13 2 Tab1, 7, 13 Tab 2, 8, 14 Tab 3, 9, 15 Tab 4, 10, Tab 5, 11 This product conforms to all

More information

3

3 2 3 CONTENTS... 2 Introduction JAPANESE... 6... 7... 8... 9 ENGLISH About Shadowing... 10 Organization of the book... 11 Features of the text... 12 To students using this book... 13 CHINESE... 14... 15...

More information

On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new e

On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new e On the Wireless Beam of Short Electric Waves. (VII) (A New Electric Wave Projector.) By S. UDA, Member (Tohoku Imperial University.) Abstract. A new electric wave projector is proposed in this paper. The

More information

43 + +* / +3+0,, 22*,, ++..0/ / 1/. / / + /* *,* +* *.* /* 0 +0 2*,/./ +3+,. + : / 3 / +** +**, // /. /+ /+ + * * + +2 +2 +3,* 3 3 ++ +, 0.. /3 : +/,.

43 + +* / +3+0,, 22*,, ++..0/ / 1/. / / + /* *,* +* *.* /* 0 +0 2*,/./ +3+,. + : / 3 / +** +**, // /. /+ /+ + * * + +2 +2 +3,* 3 3 ++ +, 0.. /3 : +/,. 42 * :. +, / /0/ ha, +. 2, 2ha. + : :, / /0/ +3,2. 2 / * 43 + +* / +3+0,, 22*,, ++..0/ / 1/. / / + /* *,* +* *.* /* 0 +0 2*,/./ +3+,. + : / 3 / +** +**, // /. /+ /+ + * * + +2 +2 +3,* 3 3 ++ +, 0.. /3

More information

041-057_’¼Œì

041-057_’¼Œì 542012 4157 Nishino Toshiaki The purpose of this paper is to analyze the present conditions of the mountain villages of Japan in the early 21 st century. The revolution of fuel sources from a predominance

More information

2

2 8 24 32C800037C800042C8000 32 40 45 54 2 3 24 40 10 11 54 4 7 54 30 26 7 9 8 5 6 7 9 8 18 7 7 7 40 10 13 12 24 22 22 8 55 8 8 8 8 1 2 3 18 11 54 54 19 24 30 69 31 40 57 23 23 22 23 22 57 8 9 30 12 12 56

More information

untitled

untitled TZ-BDT910M TZ-BDT910F TZ-BDT910P μ μ μ μ TM VQT3F51-1 l l l [HDD] [BD-RE] [BD-R] [DVD-V] [BD-V] [RAM] [CD] [SD] [-R] [USB] [-RW] [RAM AVCREC ] [-R AVCREC ] [RAM VR ][-R VR ] [-RW VR ] [-R V ] [-RW

More information

鹿大広報149号

鹿大広報149号 No.149 Feb/1999 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Learned From Japanese Life and Experiences in Kagoshima When I first came to Japan I was really surprised by almost everything, the weather,

More information

環境影響評価制度をめぐる法的諸問題(4) : 米国の環境影響評価制度について

環境影響評価制度をめぐる法的諸問題(4) : 米国の環境影響評価制度について Kwansei Gakuin University Rep Title Author(s) 環 境 影 響 評 価 制 度 をめぐる 法 的 諸 問 題 (4) : 米 国 の 環 境 影 響 評 価 制 度 について Sekine, Takamichi, 関 根, 孝 道 Citation 総 合 政 策 研 究, 33: 73-103 Issue Date 2010-02-20 URL http://hdl.handle.net/10236/3583

More information