|
Search the dblp DataBase
Yukiyasu Tsunoo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi
Cryptanalysis of DES Implemented on Computers with Cache. [Citation Graph (0, 0)][DBLP] CHES, 2003, pp:62-76 [Conf]
- Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. [Citation Graph (0, 0)][DBLP] CRYPTO, 1994, pp:369-382 [Conf]
- Kazuhiko Minematsu, Yukiyasu Tsunoo
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:226-241 [Conf]
- Kazuhiko Minematsu, Yukiyasu Tsunoo
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:242-260 [Conf]
- Kazuhiko Minematsu, Yukiyasu Tsunoo
Expanding Weak PRF with Small Key Size. [Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:284-298 [Conf]
- Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu
Improving cache attacks by considering cipher structure. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2006, v:5, n:3, pp:166-176 [Journal]
- Yukiyasu Tsunoo, Ryoji Ohta, Hiroshi Miyauchi, Katsuhiro Nakamura
A cipher strength evaluation system based on statistical methods. [Citation Graph (0, 0)][DBLP] Systems and Computers in Japan, 2003, v:34, n:8, pp:83-92 [Journal]
- Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, H. Kubo, Kazuhiko Minematsu
Shorter bit sequence is enough to break stream cipher LILI-128. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:12, pp:4312-4319 [Journal]
Impossible Differential Cryptanalysis of CLEFIA. [Citation Graph (, )][DBLP]
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. [Citation Graph (, )][DBLP]
Higher Order Differential Attacks on Reduced-Round MISTY1. [Citation Graph (, )][DBLP]
A New Video Encryption Scheme for H.264/AVC. [Citation Graph (, )][DBLP]
Distinguishing Attack Against TPypy. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|