将来の暗号技術に関する安全性要件調査報告書
|
|
- みひな ののした
- 5 years ago
- Views:
Transcription
1 i
2 DES... 4 DES Cracker (1998 ) Lenstra & Verheul Silverman GDP GDP ii
3 DES MPU URL A A A A A B B B C iii
4 1015 CRYPTREC Cryptography Research & Evaluation Committees 2000 (IPA) (TAO)
5 2
6 DNA [1] GDP 3
7 DES DES DES Challenge[2]RSA Security DES DES [3] CBC DES [11] P112, [4] DES 1 DES DES DES Cracker (1998 ) DES Cracker DES Electronic Frontier Foundation (EFF) DES [6] Cryptography Research Advanced Wireless Technologies [7] 4
8 DES Cracker DES DES Cracker DES 56 4 DES [5] DES Cracker DES Cracker DES CMOS 0.8m 40 MHz 24 ECB CBC [6][8] DES 16 40M/162.5 M / 60M / VME DES Cracker 2 DES Cracker = M 12 2 = / DES Cracker K / DES Cracker MHz, 210nm M / M 4M/24166K 5
9 Lenstra & Verheul1999 A. K. Lenstra E. R. Verheul [9] 1. Life span 2. Security margin 3. Computing environment 4. Cryptanalysis (a) Life span x x (b) Security margin DES y DES y y 1982 y = DES FIPS DES 5 6
10 (c) Computing environment Moore IC (d) Cryptanalysis DES x y DES - z = x y x y 12 z 2 z = z 2 DES 2 1 z+ z = 2 23 z 23 z DES z DES
11 Lenstra & Verheul Symmetric Classical Subgroup Elliptic Curve Infeasible Lower bound Corresponding Key Size Asymmetric Discrete Key Size number of for Hardware number of Key Size (and Logarithm progress Mips Years cost in US $ for years on SDL Field Key Size no yes a 1 day attack 450MHz Year Size) (cf. (4.5)) PentiumII PC * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
12 Symmetric Classical Subgroup Elliptic Curve Infeasible Lower bound Corresponding Key Size Asymmetric Discrete Key Size number of for Hardware number of Key Size (and Logarithm progress Mips Years cost in US $ for years on SDL Field Key Size no yes a 1 day attack 450MHz Year Size) (cf. (4.5)) PentiumII PC * * * * * * * * * * * * * * * * * * * * * * * * * * Arjen K. Lenstra, Eric R. Verheul, "Selecting Cryptographic Key Sizes", Lenstra-Verheul DES DES Lenstra-Verheul 450MHz Pentium IIPC DES 1200 Pentium II ,000,000 DES 1MMYMillion MIPS Year Lenstra-Verheul 9
13 Lenstra Verheul Lenstra-Verheul NESSIE 1 [10] RSA R.D.Silverman [12] ECOM WG 2 [11] 5 - DES DES Moore 10
14 Moore
15 Silverman2000 R.D.Silverman RSA Lenstra-Verheul [12] Lenstra-Verheul RSA 20 RSA Silverman RSA Silverman [13] embarassingly parallel DES PC DES Cracker DES DES Lenstra-Verheul Lenstra-Verheul 12
16 (1) (2) 13
17 ASCII DES Cracker DES Cracker 8 [6] 69 69/2561/4 8 1/65536(l/4 8 ) 8 14
18 embarassingly parallel embarassingly parallel N N N 15
19 N N N DES DES Cracker 1020 ( 20 16
20 N N GDP 4% 17
21 CPU CPU 50 5,000.comhttp:// CPU CPU [14]
22 I S P u c I / S ) P = I ( P / S ) ( c u u c u u P / u S u I c Camellia [15] [16] u 19
23 DES K, Camellia 128 6,367 4,979 11, , Camellia 128 Feistel SPN R 1 1 R 1 R R 20
24 16 DESCASTCamellia AESRijndael f R f / R I / S ( I / S) f / R C P / C = ( I / S)( f / R) / C AES 21
25 5-5 I f S 50K R C CPU Lenstra-Verheul
26 GDP 4% 4 GDP GDP 23
27 GDP GDP 10,416,818 US [19] GDP GDP 2002 GDP [17] GDP 32,252,480 US GDP 24
28 5-9 Lenstra-Verheul
29
30 = 2 ) / ( log 2 ) / ( log 2 = 27
31 Lenstra-Verheul
32 7 29
33 MPU Unix /etc/passwd [20] [21] 2 [21] b 2 b N 2 = N 30
34 N 2 n = 2N 1 64 n = G 64 48GB 128 n E 350 EB AESCamellia N n = 2N 1 n N = 2 1 n 1 b n = 2N b b / 2 31
35 DES DES 7-1 Lenstra-Verheul 2003 DES Cracker 32
36 DES Cracker MPU MPU PC DES MMYLenstra-Verheul [9] MMY Million MIPS Year1MIPS MMY / 2 56 = Pentium 500 / 438 / MPU FLOPS MIPS 33
37 MPU FLOPS MIPS FLOPS 7-2 CPU MPU - CPU 3000 MPU 1 ~ CPU
38 / 10 / - 2 MPU - 5 PC - MPU 10 1U MPU MPU MPU - /MPU 10 MPU MPU 2005 BlueGene/L 1 BlueGene/L 35
39 PC PC 10 PC PC PC 10W 1kWh 9 B2 kwh 1 36
40 ( [22] W 200 kw 1 [1] [27] [23][24][25] Shor [26] 37
41 Shor RSA 1 1 Moore 38
42 URL [1], [2] "Cryptographic Challenges", RSA Security, [3] DATA ENCRYPTION STANDARD (DES), FIPS PUB 46-3, [4] Project DES, distributed.net, [5] "RSA's DES Challenge III is solved in record time", RSA Security, [6] EFF (Electronic Frontier Foundation), "Cracking DES" (Jan 1999), DES, [7] Record-Breaking DES Key Search Completed, [8] John R T Brazier, Possible NSA Decryption Capabilities, [9] Arjen K. Lenstra, Eric R. Verheul, "Selecting Cryptographic Key Sizes", Journal of Cryptology (1999, 2001), [10] B. Preneel, et al., "Security Evaluation of NESSIE First Phase" (September 2001), [11] ECOM WG [12] R.D.Silverman (RSA), "A Cost Based Security Analysis of Symmetric and Asymmetric Key Lengths" (Apr 2000), [13] A.Shamir, E.Tromer, "Factoring Large Numbers with the TWIRL Device (preliminary draft)" (Jan 2003). [14] Semiconductor Industry Association (SIA), eds., "International Technology Roadmap for Semiconductors (ITRS) 2002 Update", [15] Camellia, [16], Camellia 128, [17] World Bank, "Total GDP 2002", [18] US Department of Defense, "National Defense Budget Estimates for FY2004", 39
43 [19] [20], [21],, Triple DES, IMES Discussion Paper Series 99-J-6, (1999), [22] (, [23], (2000), puters/. [24] (2003), [25] Centre for Quantum Computation, [26] P. W. Shor, Algorithms for quantum computation: discrete log and factoring, Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, S. Goldwasser (editor), IEEE Computer Society Press, Los Alamitos, 1994, pp [27], [28] The International Technology Roadmap for Semiconductors web site, [29] Intel, ZDNet 2003/12/3, [30] David Klepacki (IBM T. J. Watson Research Center), "Blue Gene Towards Petascale Computing" (April 2003), p9, [31], p 13, [32] Slides concerning TOP500 06/2002, [33] The Advanced Simulation and Computing Program (ASCI), [34] Networking and Information Technology Research and Development Supplement to the President s Budget FY2003 (Bluebook 2003),
44 A A.1 40 minimum feature 18 International Technology Roadmap for Semiconductors, ITRS[28] 15 A.2 Semiconductor Industry Association, SIA 1992 National Technology Roadmap for Semiconductors, NTRS ITRS
45 A MPU 1/2 A-1 A GHz GHz Moore A.4 Intel [29] LSI3 CMOS 42
46
47 B B.1 B-1 B-2 44
48 B GFLOPS TFLOPS TOP LINPACK TPP GFLOPSCM-5 36TFLOPS
49 CPU 1990 Intel Touchstone DeltaCPU 512 CM-5CPU 1024 NWT CPU 140 CPU ASCI Red CPU MPU CPU 1 10MFLOPS 100MFLOPS CPU ,000 B CPU ASCI [33] Bluebook
50 1 ([34] p17) 4 1. ASCI 2. PC 3. BlueGene/LIBM DNA (1)(3) (4)
51 C s s 10 Lenstra-Verheul C-1 48
52 Lenstra-Verheul p 0 t 0 p(t) p( t) = p0e at t x(t) 0 x( t) p( t) x( t ) t 1 c t1 t = 0 t x( t) dt = c t 1 1 t = 0 u= t x( t) p( t) dudt 1 x(t) : t u = t f ( t) = 1 p( t) du t p( t) = p0e at 49
53 f t) = p ( t t) e f ( 0 1 at at at { a( t t) e e } = p ( at at 1) e 0 at ( t) = p = t = ( at 1) 1 / a t Lenstra-Verheul log2 2t /3 2log 2 = ( e ) a = = at t /1.5 e 2 = 10 t = 10 1 t t = ( at1 1) / a = ( ) / = f ( t) = p p at 0 ( t1 t) e = t y (t) g (t) y( t) / g( t) c t p ( t) y( t) = p( t) g( t) x( t) 50
54 t1 t = t t = 0 u= t y( t) / g( t) dt = c t y( t) p( t) dudt X ( t) = y( t) / g( t), P( t) = g( t) p( t) t1 t = X ( t) dt = c t t t = 0 u= t X ( t) P( t) dudt Lenstra-Verheul 10 2 at t /1.5 t /10 e = 2 2 = log 2 ( e ) 23t / 30 23log 2 a = 30 = t t = ( at1 1) / a = ( ) / = f ( t) = p ( ) p at 0 t1 t e = Lenstra-Verheul
楕円曲線暗号と RSA 暗号の安全性比較
RSA, RSA RSA 7 NIST SP-7 Neal Koblitz Victor Miller ECDLP (Elliptic Curve Discrete Logarithm Problem) RSA Blu-ray AACS (Advanced Access Control System) DTCP (Digital Transmission Content Protection) RSA
More informationhttp://www.ipa.go.jp/security/ Contents 1. NIST 2010 2. NISC 3. CRYPTREC 2008 10 28 Copyrignt 2008, IPA all right reserved. 2 1977 MAC) PKI PKI PKI: (Public Key Infrastructure) 2008 10 28 Copyrignt 2008,
More informationOriginal (English version) Copyright 2001 Semiconductor Industry Association All rights reserved ITRS 2706 Montopolis Drive Austin, Texas
INTERNATIONAL TECHNOLOGY ROADMAP FOR SEMICONDUCTORS 2001 EDITION EECA, European Electronic Component Manufacturers Association () JEITA, Japan Electronics and Information Technology Industries Association
More informationShonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More information(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationuntitled
ITRS2005 DFM STRJ : () 1 ITRS STRJ ITRS2005DFM STRJ DFM ITRS: International Technology Roadmap for Semiconductors STRJ: Semiconductor Technology Roadmap committee of Japan 2 ITRS STRJ 1990 1998 2000 2005
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking RSA Group Name RSA C
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name RSA Group Name RSA Code Elliptic Curve Cryptograrhy Group /Project No. 13-B /Project Leader 1009087 Takahiro
More informationCP-PACS CP-PACS CP-PACS : 2048PU+128IOU 614GFLOPS peak 128GByte memory 1058GByte disk 1992 1996 SR2201 : 1996 8 9 CP-PACS Top 500 List ranking No. 1 November 1996 Linpack 368.2Gflops No. 24 Novermber 1999
More information09中西
PC NEC Linux (1) (2) (1) (2) 1 Linux Linux 2002.11.22) LLNL Linux Intel Xeon 2300 ASCIWhite1/7 / HPC (IDC) 2002 800 2005 2004 HPC 80%Linux) Linux ASCI Purple (ASCI 100TFlops Blue Gene/L 1PFlops (2005)
More informationSEJulyMs更新V7
1 2 ( ) Quantitative Characteristics of Software Process (Is There any Myth, Mystery or Anomaly? No Silver Bullet?) Zenya Koono and Hui Chen A process creates a product. This paper reviews various samples
More information1重谷.PDF
RSCC RSCC RSCC BMT 1 6 3 3000 3000 200310 1994 19942 VPP500/32PE 19992 VPP700E/128PE 160PE 20043 2 2 PC Linux 2048 CPU Intel Xeon 3.06GHzDual) 12.5 TFLOPS SX-7 32CPU/256GB 282.5 GFLOPS Linux 3 PC 1999
More informationimai@eng.kagawa-u.ac.jp No1 No2 OS Wintel Intel x86 CPU No3 No4 8bit=2 8 =256(Byte) 16bit=2 16 =65,536(Byte)=64KB= 6 5 32bit=2 32 =4,294,967,296(Byte)=4GB= 43 64bit=2 64 =18,446,744,073,709,551,615(Byte)=16EB
More information電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて
1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008
More informationuntitled
PCAST NSTC 1993 11 National Coordination Office (NCO/NITRD) Office of Management and Budget White House Office of Science and Technology Policy National Science and Technology Council Committee on Technolog
More information1...1 2...3 2.1.... 3 2.2.... 4 2.3.... 4 3...6 3.1.... 6 3.1.1.... 6 3.1.2.... 8 3.2.... 10 3.2.1.... 10 3.2.2.... 12 3.2.3.... 16 3.2.4.... 17 3.3..
Japan PersonalComputer Software Association 1...1 2...3 2.1.... 3 2.2.... 4 2.3.... 4 3...6 3.1.... 6 3.1.1.... 6 3.1.2.... 8 3.2.... 10 3.2.1.... 10 3.2.2.... 12 3.2.3.... 16 3.2.4.... 17 3.3.... 18 3.3.1....
More information<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
More information2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More information1.... 1 2.... 2 2.1.... 2 2.2.... 4 2.3.... 7 3.... 9 3.1.... 9 3.1.1.... 10 3.1.2.... 11 3.1.3.... 13 3.1.4.... 15 3.1.5.... 16 3.1.6.... 17 3.2.... 18 3.2.1.... 19 3.2.2.... 20 3.2.3.... 20 3.2.4....
More informationProposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai NTT Laboratories th
Proposal of addition of new cipher suites to TLS to support Camellia, EPOC, and PSEC Shiho Moriai shiho@isl.ntt.co.jp NTT Laboratories 128-bit Block Cipher Camellia Kazumaro Aoki * Tetsuya Ichikawa Masayuki
More information独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor
独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that
More informationIPSJ SIG Technical Report Vol.2017-ARC-225 No.12 Vol.2017-SLDM-179 No.12 Vol.2017-EMB-44 No /3/9 1 1 RTOS DefensiveZone DefensiveZone MPU RTOS
1 1 RTOS DefensiveZone DefensiveZone MPU RTOS RTOS OS Lightweight partitioning architecture for automotive systems Suzuki Takehito 1 Honda Shinya 1 Abstract: Partitioning using protection RTOS has high
More informationohpr.dvi
2003-08-04 1984 VP-1001 CPU, 250 MFLOPS, 128 MB 2004ASCI Purple (LLNL)64 CPU 197, 100 TFLOPS, 50 TB, 4.5 MW PC 2 CPU 16, 4 GFLOPS, 32 GB, 3.2 kw 20028 CPU 640, 40 TFLOPS, 10 TB, 10 MW (ASCI: Accelerated
More information23 Fig. 2: hwmodulev2 3. Reconfigurable HPC 3.1 hw/sw hw/sw hw/sw FPGA PC FPGA PC FPGA HPC FPGA FPGA hw/sw hw/sw hw- Module FPGA hwmodule hw/sw FPGA h
23 FPGA CUDA Performance Comparison of FPGA Array with CUDA on Poisson Equation (lijiang@sekine-lab.ei.tuat.ac.jp), (kazuki@sekine-lab.ei.tuat.ac.jp), (takahashi@sekine-lab.ei.tuat.ac.jp), (tamukoh@cc.tuat.ac.jp),
More informationスパコンに通じる並列プログラミングの基礎
2016.06.06 2016.06.06 1 / 60 2016.06.06 2 / 60 Windows, Mac Unix 0444-J 2016.06.06 3 / 60 Part I Unix GUI CUI: Unix, Windows, Mac OS Part II 0444-J 2016.06.06 4 / 60 ( : ) 6 6 ( ) 6 10 6 16 SX-ACE 6 17
More informationICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に
IC IC IC ICIC EMVEMV IC EMVIC EMV ICEMVRSAkey TDES TDES-MAC E-mail: masataka.suzuki@boj.or.jp NTTE-mail: kanda.masayuki@lab.ntt.co.jp IC IC IC IC EMV JCCA ICJCCA ICEMV EMVIC EMV EMV EMVEMVCo EMV EMV EMVICIC
More informationRSA署名方式の安全性を巡る研究動向について
RSA RSA RSA RSA RSA RSA PSSRSA PSS RSARSA PSS RSA PSS RSARSA-PSS E-mail:mayumi.saitou@boj.or.jp RSARSA PKCS ISO ISO IPS ANS X RSARSA RSA RSA RSA RSA RSA RSA bit RSA RSA PSS RSA PSS RSA ISO PKCSVer RSA
More information量子暗号通信の仕組みと開発動向
RSA AES 1 BB84Y-00 E-mail: hitoshi.gotou-1@boj.or.jp //2009.10 107 1. 2008 10 9 20 km 1.02 Mbps 100 km 10.1 kbps 1 Gbps 10 Gbps VPN 7 km 2. 1 3 2 1 2 108 /2009.10 1 2 2 109 2 ID IC KEELOQ 1 1 EUROCRYPT2008
More information1 GPU GPGPU GPU CPU 2 GPU 2007 NVIDIA GPGPU CUDA[3] GPGPU CUDA GPGPU CUDA GPGPU GPU GPU GPU Graphics Processing Unit LSI LSI CPU ( ) DRAM GPU LSI GPU
GPGPU (I) GPU GPGPU 1 GPU(Graphics Processing Unit) GPU GPGPU(General-Purpose computing on GPUs) GPU GPGPU GPU ( PC ) PC PC GPU PC PC GPU GPU 2008 TSUBAME NVIDIA GPU(Tesla S1070) TOP500 29 [1] 2009 AMD
More informationsupercomputer2010.ppt
nanri@cc.kyushu-u.ac.jp 1 !! : 11 12! : nanri@cc.kyushu-u.ac.jp! : Word 2 ! PC GPU) 1997 7 http://wiredvision.jp/news/200806/2008062322.html 3 !! (Cell, GPU )! 4 ! etc...! 5 !! etc. 6 !! 20km 40 km ) 340km
More information07-二村幸孝・出口大輔.indd
GPU Graphics Processing Units HPC High Performance Computing GPU GPGPU General-Purpose computation on GPU CPU GPU GPU *1 Intel Quad-Core Xeon E5472 3.0 GHz 2 6 MB L2 cache 1600 MHz FSB 80 GFlops 1 nvidia
More information南原
The Foreign Trade and Navigation of the Port of Bangkok, The Foreign Trade and Navigation of the Kingdom of Siam, Annual Statement of the Foreign Trade and Navigation of the Kingdom of Siam The Foreign
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationスパコンに通じる並列プログラミングの基礎
2018.09.10 furihata@cmc.osaka-u.ac.jp ( ) 2018.09.10 1 / 59 furihata@cmc.osaka-u.ac.jp ( ) 2018.09.10 2 / 59 Windows, Mac Unix 0444-J furihata@cmc.osaka-u.ac.jp ( ) 2018.09.10 3 / 59 Part I Unix GUI CUI:
More information1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15. 1. 2. 3. 16 17 18 ( ) ( 19 ( ) CG PC 20 ) I want some rice. I want some lice. 21 22 23 24 2001 9 18 3 2000 4 21 3,. 13,. Science/Technology, Design, Experiments,
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More informationスパコンに通じる並列プログラミングの基礎
2018.06.04 2018.06.04 1 / 62 2018.06.04 2 / 62 Windows, Mac Unix 0444-J 2018.06.04 3 / 62 Part I Unix GUI CUI: Unix, Windows, Mac OS Part II 2018.06.04 4 / 62 0444-J ( : ) 6 4 ( ) 6 5 * 6 19 SX-ACE * 6
More information単位、情報量、デジタルデータ、CPUと高速化 ~ICT用語集~
CPU ICT mizutani@ic.daito.ac.jp 2014 SI: Systèm International d Unités SI SI 10 1 da 10 1 d 10 2 h 10 2 c 10 3 k 10 3 m 10 6 M 10 6 µ 10 9 G 10 9 n 10 12 T 10 12 p 10 15 P 10 15 f 10 18 E 10 18 a 10 21
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationuntitled
2005 2 1 105-0004 5-34-3 Tel: 03-3431-4002 Fax: 03-3431-4044 1 SRL/ISTEC 1 1 SFQ SFQ SFQ 2004 9 4 SFQ SFQ / LSI 269 230 230 230 269 230 SFQ SFQ 2005 2 ISTEC 2005 All rights reserved. - 1 - 2005 2 1 105-0004
More informationCopyright 2001 by Junichi Sawase
JAIST Reposi https://dspace.j Title 知識コミュニティを活性化するインフォーマルコミュ ニケーションツールの開発 Author(s) 澤瀬, 順一 Citation Issue Date 2001-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/716
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More informationResearch on Academic Degrees and University Evaluation The Chronicle of Higher Education Chronicle Analytical Perspectives Research Centers Directory Research Centers Directory Administrative Policies
More informationIP Management Within Universities: Experiences in the US
yuko.harayama@most.tohoku.ac.jp 17/3/2004 1 Ref. Sandelin TLO expertise Ref. AUTM 17/3/2004 2 Ref. Heller & Eisenberg, 1998 The scientific commons is becoming privatized! (Ref. Nelson, 2003) 17/3/2004
More informationJR東日本会社要覧2012-2013
Technology Planning Department Frontier Service Development Laboratory Advanced Railway System Development Center Safety Research Laboratory Disaster Prevention Research Laboratory Technical Center Environmental
More informationIPSJ SIG Technical Report Vol.2009-BIO-17 No /5/26 DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing
DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing Youhei Namiki 1 and Yutaka Akiyama 1 Pyrosequencing, one of the DNA sequencing technologies, allows us to determine
More informationIPSJ SIG Technical Report Vol.2013-ARC-203 No /2/1 SMYLE OpenCL (NEDO) IT FPGA SMYLEref SMYLE OpenCL SMYLE OpenCL FPGA 1
SMYLE OpenCL 128 1 1 1 1 1 2 2 3 3 3 (NEDO) IT FPGA SMYLEref SMYLE OpenCL SMYLE OpenCL FPGA 128 SMYLEref SMYLE OpenCL SMYLE OpenCL Implementation and Evaluations on 128 Cores Takuji Hieda 1 Noriko Etani
More information86 Development of a Course Classification Support System for the Awarding of Degrees using Syllabus Data MIYAZAKI Kazuteru, IDA Masaaki, YOSHIKANE Fuyuki, NOZAWA Takayuki and KITA Hajime Research in Academic
More information27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U
YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube
More informationYMS-VPN1_User_Manual
YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows
More informationISO/TC68における金融分野向け推奨暗号アルゴリズムの検討状況
ISO/TC68 2-key DES 1,024 RSA SHA-1 NIST ISO/TC68 2-key DES ISO/TC68 ISO/TC68 DES ISO/TC68 SHA-1 RSA E-mail: yuuko.tamura@boj.or.jp / /2009.3 173 1. IC PIN FISCFISC [2006] 1 2-key DES 1,024 RSA 1,024 RSA
More informationPC Development of Distributed PC Grid System,,,, Junji Umemoto, Hiroyuki Ebara, Katsumi Onishi, Hiroaki Morikawa, and Bunryu U PC WAN PC PC WAN PC 1 P
PC Development of Distributed PC Grid System,,,, Junji Umemoto, Hiroyuki Ebara, Katsumi Onishi, Hiroaki Morikawa, and Bunryu U PC WAN PC PC WAN PC 1 PC PC PC PC PC Key Words:Grid, PC Cluster, Distributed
More informationIMES Discussion Paper Series 98-J
IMES DISCUSSION PAPER SERIES Discuss ssion Paper No. 98-J-1 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN IMES Discussion Paper Series 98-J-1 1998 1 E-mail: tokiko.shimizu@boj.or.jp 1. 1.1.
More informationStudies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth
Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth and Foot Breadth Akiko Yamamoto Fukuoka Women's University,
More informationISO/IEC 9798プロトコルの安全性評価
ISO/IEC 9798 2011 2 4 ISO/IEC 9798-2 (Mechanisms using symmetric encipherment algorithms), ISO/IEC 9798-3 (Mechanisms using digital signature techniques), ISO/IEC 9798-4 (Mechanisms using a cryptographic
More informationASF-01
暗号モジュール試験及び認証制度 (JCMVP) 承認されたセキュリティ機能に関する仕様 平成 26 年 4 月 1 日独立行政法人情報処理推進機構 ASF-01 A p p r o v e d S e c u r i t y F u n c t i o n s 目次 1. 目的... 1 2. 承認されたセキュリティ機能... 1 公開鍵... 1 共通鍵... 3 ハッシュ... 4 メッセージ認証...
More information1 2 4 5 9 10 12 3 6 11 13 14 0 8 7 15 Iteration 0 Iteration 1 1 Iteration 2 Iteration 3 N N N! N 1 MOPT(Merge Optimization) 3) MOPT 8192 2 16384 5 MOP
10000 SFMOPT / / MOPT(Merge OPTimization) MOPT FMOPT(Fast MOPT) FMOPT SFMOPT(Subgrouping FMOPT) SFMOPT 2 8192 31 The Proposal and Evaluation of SFMOPT, a Task Mapping Method for 10000 Tasks Haruka Asano
More information( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................
More informationBCCE製品ガイド
1 Jetico Inc. Oy PROPRIETARY 2 BCCE BestCrypt Container Encryption BCCE BCCE V.9 BCCE Jetico Jetico 3 BCCE BCCE (BestCrypt Container Encryption) Jetico Jetico 100 100 米 国 原 子 力 規 制 委 員 会 4 BCCE BCCE (BestCrypt
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationパナソニック技報
Panasonic Technical Journal Vol. 64 No. 2 Nov. 2018 Optical Disc Archiving System with 100 Years Lifespan of Digital Data Takuto Yamazaki Yasushi Kobayashi Blu-ray Disc 1 Archival Disc 2 3300 GB 10012
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationGDPギャップと潜在成長率
2003 output gap 80 1 20 90 20 70 2 1 2 output gap potential output 1 2 (2001) 3 potential rate of growth 2000 Meyer (2000) European Central Bank: (1999b) 2002 10 4 3 (2000) 4 4 () 5 5 5 6 () () 7 Total
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More information2014 2
2014 2 Web Web 1 1 1 1.1................................... 1 1.2.................................... 1 1.3.............................. 1 1.4.................................... 2 1.5...................................
More informationMicrosoft Word コンピュータ関連知識
(1) 4 1. (supercomputer) 2. (mainframe) (large scale computer) (general purpose computer)] 3. (minicomputer) (midrange computer) Workstation,WS 4. (Personal Computer, PC) 24 room-size computer mainframe
More informationDEIM Forum 2017 H ,
DEIM Forum 217 H5-4 113 8656 7 3 1 153 855 4 6 1 3 2 1 2 E-mail: {satoyuki,haya,kgoda,kitsure}@tkl.iis.u-tokyo.ac.jp,.,,.,,.,, 1.. 1956., IBM IBM RAMAC 35 IBM 35 24 5, 5MB. 1961 IBM 131,,, IBM 35 13.,
More information21 e-learning Development of Real-time Learner Detection System for e-learning
21 e-learning Development of Real-time Learner Detection System for e-learning 1100349 2010 3 1 e-learning WBT (Web Based training) e-learning LMS (Learning Management System) LMS WBT e-learning e-learning
More information1 3 i i MURC 1/10
2010 10 1 (*) (*) 2010 9 17 108-8248 2-16-4 TEL03-6711-1241 1 3 i 2010 2010 21 15 38 1618 25 14 1517 11 8 15 1618 25 i MURC 1/10 http://www.murc.jp//politics_c1/pol_report/ 60 64 2 1,000 ii 30 29 32 31
More information1 osana@eee.u-ryukyu.ac.jp : FPGA : HDL, Xilinx Vivado + Digilent Nexys4 (Artix-7 100T) LSI / PC clock accurate / Artix-7 XC7A100T Kintex-7 XC7K325T : CAD Hands-on: HDL (Verilog) CAD (Vivado HLx) : 28y4
More informationCPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2
FFT 1 Fourier fast Fourier transform FFT FFT FFT 1 FFT FFT 2 Fourier 2.1 Fourier FFT Fourier discrete Fourier transform DFT DFT n 1 y k = j=0 x j ω jk n, 0 k n 1 (1) x j y k ω n = e 2πi/n i = 1 (1) n DFT
More informationIntroductionToQuantumComputer
http://quantphys.org/wp/keisukefujii/?p=433 Twitter Keisuke Fujii@fgksk ? 1687: () Isaac Newton (1642-1727) http://www.newton.cam.ac.uk/art/portrait.html Equation of motion ? 1687: () 1873: () James C.
More informationMullen IFDOInternational Federation of Data Organizations http : / / www. ifdo. org / org _ archives/arc_bfr.htm CESSDA CESSDA CESSDA http://www.nsd.uib.no/ Cessda/ CESSDAArchives in Europe Elder et al.
More information80 GDP GDP Key Indicators GDP IT RIM 2007 Vol.7 No
87 90 2001 90 IT 20012002 90 80 118 RIM 2007 Vol.7 No.27 80 GDP 86 80 100 80 60 40 20 0 GDP 1981 86 91 96 01 2006 Key Indicators 2006 2006 71.7 GDP 200122.7 23 2003 2001IT 80 60 RIM 2007 Vol.7 No.27 119
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More informationパーソナルコンピュータのヘドニック回帰式
2002 8 2002 8 1 HDD 2 2 8 1 wp01-24 1 BP 6 PC 2 DELL SOTEC IBM IBM Net Vista Series IBM 1 PC IBM Net Vista Series 2 2001 2002 246 293 2 2 1 2 CPU HDD CRT TFT CPU HDD CRT TFT CPU HDD 1 2.0kg 2.0kg 1 0 TFT
More informationJournal of the Combustion Society of Japan Vol.56 No.178 (2014) FEATURE /Issues and Solutions for Engine Combustion φ-t マッ
56 178 2014 291-297 Journal of the Combustion Society of Japan Vol.56 No.178 (2014) 291-297 FEATURE /Issues and Solutions for Engine Combustion φ-t マップとエンジン燃焼コンセプトの接点 A Point of Contact between a φ-t Map
More information23 Study on Generation of Sudoku Problems with Fewer Clues
23 Study on Generation of Sudoku Problems with Fewer Clues 1120254 2012 3 1 9 9 21 18 i Abstract Study on Generation of Sudoku Problems with Fewer Clues Norimasa NASU Sudoku is puzzle a kind of pencil
More informationWinter 2009 No Lower Earnings Limit
特集 : イギリスの社会保障 - ニューレイバーの 10 年 イギリスの公的 私的年金制度改革 丸谷浩介 I 1 50 1997 II 1. 2 15 Winter 2009 No. 169 8 3 4 1999 1989 8 2. 4 1 2 1 1992 6 16 Lower Earnings Limit1 65 60 1 2 16 2.40 16 2 1 5 1 2 3. 6 1970 State
More information_16_.indd
well-being well-being well-being Cantril Ladder well-being well-being Cantril Self-Anchoring Striving Scale Cantril Ladder Ladder Ladder awellbeing well-being well-being Gallup World Poll World Database
More informationuntitled
MMRC DISCUSSION PAPER SERIES MMRC-J-7 COE 2004 3 COE E-mail: miyazaki@gbrc.jp 2004 3 ( ) (, 2003; Ulrich, 1995) (2002) 1 Langlois and Robertson (1992) (2001) (Baldwin & Clark, 2000; Sanchez, 2000; Sanchez
More information[http://www.measuredhs.com/aboutsurveys/dhs/ start.cfm] Black, T. R., Namwadda, R., Mugambe, J., Walugembe, E. & Esanu, C. (1999). Education growth in Uganda. International Journal of Educational Development,
More information産業・企業レベルデータで見た日本の経済成長.pdf
2003 11 10 IT IT JIP JCER ) 2003 CD-ROM http://www.esri.go.jp/jp/archive/bun/bun170/170index. html 1 JIP Jorgenson, Mun, andstiroh (2002) GDP 2 3 1951 1954 1957 1960 1963 1966 1969 1972 1975 1978 1981
More informationHPC可視化_小野2.pptx
大 小 二 生 高 方 目 大 方 方 方 Rank Site Processors RMax Processor System Model 1 DOE/NNSA/LANL 122400 1026000 PowerXCell 8i BladeCenter QS22 Cluster 2 DOE/NNSA/LLNL 212992 478200 PowerPC 440 BlueGene/L 3 Argonne
More information1 1 1 [2000]
* 2000 7 26 1 1 1 [2000] 1 2 1 2 2 1 B to C 250000 億円 200000 日本米国 213,200 150000 100000 50000 0 153,600 106,900 71,100 66,620 42,700 43,860 22,500 26,940 15,340 645 3,360 7,730 1998 年 1999 年 2000 年 2001
More information橡最新卒論
Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,
More informationX Z Y に X Y Y 7 8 30cm3m 3000 9 そ の プ リ ペ イ ド 0 48 2 2
204 singularity 2 BITCOIN 204228 490 46 3 4 5 X Y 6 X Z Y に X Y Y 7 8 30cm3m 3000 9 そ の プ リ ペ イ ド 0 48 2 2 3 2009Nakamoto P2P 4 A D, B E P2P THE OPEN UNIVERSITY OF JAPAN WKHRSHQXQLYHUVLWBRIMDSDQ 5 6 U
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More informationGDP GDP 1 98% 2
2016 2016 4 6 [ ] 1 1.1 1.1.1 1. 2. 3. 2 1 4. 1 700-800 1 GDP GDP 1 98% 2 1.1.2 BOD Biochemical Oxygen Demand BOD COD Chemical Oxygen Demand COD DO DO PM2.5 eg.1 GDP CO 2 eg.2 Life Cycle Assessment 3 eg.
More information1_26.dvi
C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito
More informationUnknown
Journal of Breast and Thyroid Sonology Journal of Breast and Thyroid Sonology Vol.2, No.3 July 2013 Report The 30 th Meeting of Japan Association of Breast and Thyroid Sonology... 1 Department of Organ
More information2 1997 1M SRAM 1 25 ns 1 100 250 1,000 DRAM 60 120 ns 50 5 10 50 10 20 ms 5,000,000 0.1 0.2 1
1 2 1997 1M SRAM 1 25 ns 1 100 250 1,000 DRAM 60 120 ns 50 5 10 50 10 20 ms 5,000,000 0.1 0.2 1 CPU 1 1 2 2 n CPU SRAM DRAM CPU 3 4 5 6 7 N+ N+ P SRAM DRAM 8 Computer Architecture 9 DRAM 3 4 10 11 Ta 2
More informationItanium2ベンチマーク
HPC CPU mhori@ile.osaka-u.ac.jp Special thanks Timur Esirkepov HPC 2004 2 25 1 1. CPU 2. 3. Itanium 2 HPC 2 1 Itanium2 CPU CPU 3 ( ) Intel Itanium2 NEC SX-6 HP Alpha Server ES40 PRIMEPOWER SR8000 Intel
More information04-“²†XŒØ‘�“_-6.01
Bull. Natn. Sci. Mus., Tokyo, Ser. E, 28, pp. 31 47, December 22, 2005 169 0073 3 23 1 153 8904 4 6 1 270 2261 2 16 4 124 0014 2 10 15 523 0058 961 The Mechanism of Automatic Display for the Temporal Hour
More information