Hidema Tanaka

According to our database1, Hidema Tanaka authored at least 64 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A statistical Markov-based password strength meter.
Internet Things, April, 2024

BGP hijack attack policy against AS topology map.
Internet Things, April, 2024

2023
A Study for Security of Visual Cryptography.
Proceedings of the Codes, Cryptology and Information Security, 2023

Security Enhancement Method Using Shortened Error Correcting Codes.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers.
J. Inf. Process., 2022

Improved scheme and evaluation method for progressive visual cryptography.
EURASIP J. Inf. Secur., 2022

A Novel Metric for Password Security Risk Against Dictionary Attacks.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

A Study of Network Attack Strategy Using AS Topology Map.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

2021
SVTester: Finding DoS Vulnerabilities of Virtual Switches.
J. Inf. Process., 2021

SPEChecker: Checking the feasibility of Slow-port-exhaustion attack on various hypervisors.
Internet Things, 2021

Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS^{MT}}$.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Experimental Verification of Estimated Block Size of BKZ Algorithm Against LWE.
Proceedings of the Information Systems Security - 17th International Conference, 2021

2020
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
An Analysis of TCP ACK Storm DoS Attack on Virtual Network.
Proceedings of the 19th International Symposium on Communications and Information Technologies, 2019

Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Leaving All Proxy Server Logs to Paragraph Vector.
J. Inf. Process., 2018

Macros Finder: Do You Remember LOVELETTER?
Proceedings of the Information Security Practice and Experience, 2018

A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Slow-Port-Exhaustion DoS Attack on Virtual Network Using Port Address Translation.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Discovering New Malware Families Using a Linguistic-Based Macros Detection Method.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Verifiable Secret Sharing Scheme Using Hash Values.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
Improvements on Security Evaluation of AES against Differential Bias Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Abusing TCP Retransmission for DoS Attack Inside Virtual Network.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Dark Domain Name Attack: A New Threat to Domain Name System.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Reading Network Packets as a Natural Language for Intrusion Detection.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Analysis of Effectiveness of Slow Read DoS Attack and Influence of Communication Environment.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs.
Proceedings of the 12th Asia Joint Conference on Information Security, 2017

Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

2016
Algebraic Degree Estimation for Integral Attack by Randomized Algorithm.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Network Counter-Attack Strategy by Topology Map Analysis.
Proceedings of the Information Systems Security - 12th International Conference, 2016

2015
Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Improved GPU Implementation of RainbowCrack.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Integral Attack on Reduced-Round Rectangle.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Throughput and Power Efficiency Evaluation of Block Ciphers on Kepler and GCN GPUs Using Micro-Benchmark Analysis.
IEICE Trans. Inf. Syst., 2014

Analysis of Side-Channel Attack Based on Information Theory.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Analysis of Slow Read DoS attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Study on a scheme for the right to be forgotten.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Intrusion detection system using Discrete Fourier Transform.
Proceedings of the Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2014

2013
Performance Prediction Model for Block Ciphers on GPU Architectures.
Proceedings of the Network and System Security - 7th International Conference, 2013

Information Theoretical Analysis of Side-Channel Attack.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Throughput and Power Efficiency Evaluations of Block Ciphers on Kepler and GCN GPUs.
Proceedings of the First International Symposium on Computing and Networking, 2013

2012
A Correlation Power Analysis Countermeasure for Enocoro-128 v2 Using Random Switching Logic.
Proceedings of the Third International Conference on Networking and Computing, 2012

2010
Changes to Quantum Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels.
Proceedings of the ARES 2010, 2010

2009
Updating Quantum Cryptography Report ver. 1.
CoRR, 2009

2008
Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest.
IEICE Trans. Inf. Syst., 2008

Linearization Method and Linear Complexity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Classification of Hash Functions Suitable for Real-Life Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Security Analysis of MISTY1.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.
Proceedings of the Information Systems Security, Third International Conference, 2007

2005
Anonymous Password-Based Authenticated Key Exchange.
Proceedings of the Progress in Cryptology, 2005

2004
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Evaluation and Improvement of the Tempest Fonts.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2003
An Optimized Algebraic Method for Higher Order Differential Attack.
Proceedings of the Applied Algebra, 2003

2001
The Block Cipher SC2000.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack.
Proceedings of the Information Security and Cryptology, 2000

1999
Strenght of MISTY1 without FL Function for Higher Order Differential Attack.
Proceedings of the Applied Algebra, 1999

1997
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner.
Proceedings of the Information Security, First International Workshop, 1997


  Loading...