According to our database1, Dai Watanabe authored at least 25 papers between 2001 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Comparison of Deep Learning and Image Processing for Tracking the Cognitive Motion of a Laboratory Mouse.
Proceedings of the 2019 IEEE Biomedical Circuits and Systems Conference, 2019
Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography.
Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data.
IEICE Transactions, 2015
Improving the Security of Cryptographic Protocol Standards.
IEEE Security & Privacy, 2015
Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers.
IACR Cryptology ePrint Archive, 2014
Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication.
Proceedings of the Radio Frequency Identification System Security, 2014
Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2.
IEICE Transactions, 2013
A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications.
Proceedings of the Radio Frequency Identification System Security, 2013
Key Update Mechanism for Network Storage of Encrypted Data.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Finding Collisions for Reduced Luffa-256 v2 (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Update on Enocoro stream cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Higher Order Differential Attack on Step-Reduced Variants of Luffa v1.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Second Preimage Attack on SHAMATA-512.
Proceedings of the Progress in Cryptology, 2009
Enocoro-80: A Hardware Oriented Stream Cipher.
Proceedings of the The Third International Conference on Availability, 2008
MAME: A Compression Function with Reduced Hardware Requirements.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Update on Tiger.
Proceedings of the Progress in Cryptology, 2006
A MAC Forgery Attack on SOBER-128.
IEICE Transactions, 2005
A New Keystream Generator MUGI.
IEICE Transactions, 2004
A MAC Forgery Attack on SOBER-128.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Modeling of Train Control System and a Method of Assurance Evaluation.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002
Assurance Evaluation Technology of Train Control System for Achieving Expansion during Operation .
Proceedings of the 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 2002
Dependable Automatic Train Control System Using Digital Track Signals.
Proceedings of the 8th Pacific Rim International Symposium on Dependable Computing (PRDC 2001), 2001
The New ATC Systems with an Autonomous Speed Control with On-Board Equipment.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001
Assurance Technologies for Autonomous Train on-Board Computer System.
Proceedings of the 8th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS 2001), 2001