Dai Watanabe

According to our database1, Dai Watanabe authored at least 25 papers between 2001 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Comparison of Deep Learning and Image Processing for Tracking the Cognitive Motion of a Laboratory Mouse.
Proceedings of the 2019 IEEE Biomedical Circuits and Systems Conference, 2019

Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography.
JIP, 2017

Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data.
IEICE Transactions, 2015

Improving the Security of Cryptographic Protocol Standards.
IEEE Security & Privacy, 2015

Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
IACR Cryptology ePrint Archive, 2014

Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication.
Proceedings of the Radio Frequency Identification System Security, 2014

Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2.
IEICE Transactions, 2013

A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications.
Proceedings of the Radio Frequency Identification System Security, 2013

Key Update Mechanism for Network Storage of Encrypted Data.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Finding Collisions for Reduced Luffa-256 v2 (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Update on Enocoro stream cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Higher Order Differential Attack on Step-Reduced Variants of Luffa v1.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Second Preimage Attack on SHAMATA-512.
Proceedings of the Progress in Cryptology, 2009

Enocoro-80: A Hardware Oriented Stream Cipher.
Proceedings of the The Third International Conference on Availability, 2008

MAME: A Compression Function with Reduced Hardware Requirements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

Update on Tiger.
Proceedings of the Progress in Cryptology, 2006

A MAC Forgery Attack on SOBER-128.
IEICE Transactions, 2005

A New Keystream Generator MUGI.
IEICE Transactions, 2004

A MAC Forgery Attack on SOBER-128.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Modeling of Train Control System and a Method of Assurance Evaluation.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

Assurance Evaluation Technology of Train Control System for Achieving Expansion during Operation .
Proceedings of the 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 2002

Dependable Automatic Train Control System Using Digital Track Signals.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

The New ATC Systems with an Autonomous Speed Control with On-Board Equipment.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Assurance Technologies for Autonomous Train on-Board Computer System.
Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS 2001), 2001