Dai Watanabe

According to our database1, Dai Watanabe authored at least 25 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Comparison of Deep Learning and Image Processing for Tracking the Cognitive Motion of a Laboratory Mouse.
Proceedings of the 2019 IEEE Biomedical Circuits and Systems Conference, 2019

2017
Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography.
JIP, 2017

2015
Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data.
IEICE Transactions, 2015

Improving the Security of Cryptographic Protocol Standards.
IEEE Security & Privacy, 2015

2014
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
IACR Cryptology ePrint Archive, 2014

Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication.
Proceedings of the Radio Frequency Identification System Security, 2014

2013
Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2.
IEICE Transactions, 2013

A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications.
Proceedings of the Radio Frequency Identification System Security, 2013

Key Update Mechanism for Network Storage of Encrypted Data.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2011
Finding Collisions for Reduced Luffa-256 v2 (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Update on Enocoro stream cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Higher Order Differential Attack on Step-Reduced Variants of Luffa v1.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Second Preimage Attack on SHAMATA-512.
Proceedings of the Progress in Cryptology, 2009

2008
Enocoro-80: A Hardware Oriented Stream Cipher.
Proceedings of the The Third International Conference on Availability, 2008

2007
MAME: A Compression Function with Reduced Hardware Requirements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2006
Update on Tiger.
Proceedings of the Progress in Cryptology, 2006

2005
A MAC Forgery Attack on SOBER-128.
IEICE Transactions, 2005

2004
A New Keystream Generator MUGI.
IEICE Transactions, 2004

A MAC Forgery Attack on SOBER-128.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

2002
Modeling of Train Control System and a Method of Assurance Evaluation.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002

Assurance Evaluation Technology of Train Control System for Achieving Expansion during Operation .
Proceedings of the 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 2002

2001
Dependable Automatic Train Control System Using Digital Track Signals.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001

The New ATC Systems with an Autonomous Speed Control with On-Board Equipment.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

Assurance Technologies for Autonomous Train on-Board Computer System.
Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS 2001), 2001


  Loading...