The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hidema Tanaka: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko
    An Optimized Algebraic Method for Higher Order Differential Attack. [Citation Graph (0, 0)][DBLP]
    AAECC, 2003, pp:61-70 [Conf]
  2. Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko
    Strenght of MISTY1 without FL Function for Higher Order Differential Attack. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:221-230 [Conf]
  3. Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
    The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:312-327 [Conf]
  4. Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko
    On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:14-21 [Conf]
  5. Duong Viet, Akihiro Yamamura, Hidema Tanaka
    Anonymous Password-Based Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:244-257 [Conf]
  6. Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko
    An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:43-54 [Conf]
  7. Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura
    Evaluation and Improvement of the Tempest Fonts. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:457-469 [Conf]
  8. Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko
    Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:18-27 [Journal]

  9. Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels. [Citation Graph (, )][DBLP]


  10. Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. [Citation Graph (, )][DBLP]


  11. Security Analysis of MISTY1. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002