The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yukiyasu Tsunoo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi
    Cryptanalysis of DES Implemented on Computers with Cache. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:62-76 [Conf]
  2. Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu
    Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:369-382 [Conf]
  3. Kazuhiko Minematsu, Yukiyasu Tsunoo
    Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:226-241 [Conf]
  4. Kazuhiko Minematsu, Yukiyasu Tsunoo
    Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:242-260 [Conf]
  5. Kazuhiko Minematsu, Yukiyasu Tsunoo
    Expanding Weak PRF with Small Key Size. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:284-298 [Conf]
  6. Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu
    Improving cache attacks by considering cipher structure. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:3, pp:166-176 [Journal]
  7. Yukiyasu Tsunoo, Ryoji Ohta, Hiroshi Miyauchi, Katsuhiro Nakamura
    A cipher strength evaluation system based on statistical methods. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2003, v:34, n:8, pp:83-92 [Journal]
  8. Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, H. Kubo, Kazuhiko Minematsu
    Shorter bit sequence is enough to break stream cipher LILI-128. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:12, pp:4312-4319 [Journal]

  9. Impossible Differential Cryptanalysis of CLEFIA. [Citation Graph (, )][DBLP]


  10. Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. [Citation Graph (, )][DBLP]


  11. Higher Order Differential Attacks on Reduced-Round MISTY1. [Citation Graph (, )][DBLP]


  12. A New Video Encryption Scheme for H.264/AVC. [Citation Graph (, )][DBLP]


  13. Distinguishing Attack Against TPypy. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002