|
Search the dblp DataBase
Hidema Tanaka:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko
An Optimized Algebraic Method for Higher Order Differential Attack. [Citation Graph (0, 0)][DBLP] AAECC, 2003, pp:61-70 [Conf]
- Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko
Strenght of MISTY1 without FL Function for Higher Order Differential Attack. [Citation Graph (0, 0)][DBLP] AAECC, 1999, pp:221-230 [Conf]
- Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:312-327 [Conf]
- Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:14-21 [Conf]
- Duong Viet, Akihiro Yamamura, Hidema Tanaka
Anonymous Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:244-257 [Conf]
- Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. [Citation Graph (0, 0)][DBLP] ISW, 1997, pp:43-54 [Conf]
- Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura
Evaluation and Improvement of the Tempest Fonts. [Citation Graph (0, 0)][DBLP] WISA, 2004, pp:457-469 [Conf]
- Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:18-27 [Journal]
Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels. [Citation Graph (, )][DBLP]
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. [Citation Graph (, )][DBLP]
Security Analysis of MISTY1. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|