Masayuki Kanda

According to our database1, Masayuki Kanda authored at least 16 papers between 1998 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Brand Validation: Security Indicator to Better Indicate Website Identity.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2011
Addition of the Camellia Cipher Suites to Transport Layer Security (TLS).
RFC, September, 2011

2010
Camellia Cipher Suites for TLS.
RFC, June, 2010

2009
Modes of Operation for Camellia for Use with IPsec.
RFC, April, 2009

Camellia Counter Mode and Camellia Counter with CBC-MAC Mode Algorithms.
RFC, April, 2009

2005
The Camellia Cipher Algorithm and Its Use With IPsec.
RFC, December, 2005

Addition of Camellia Cipher Suites to Transport Layer Security (TLS).
RFC, July, 2005

2002
On the Security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

The 128-Bit Block Cipher <i>Camellia</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication Masayuki Abe and Masayuki Kanda.
Comput. J., 2002

2001
Security of Camellia against Truncated Differential Cryptanalysis.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Security of E2 against Truncated Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

1998
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Proceedings of the Selected Areas in Cryptography '98, 1998


  Loading...