Toshinobu Kaneko

According to our database1, Toshinobu Kaneko authored at least 61 papers between 1991 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Higher Order Differential Attack against Full-Round BIG.
IACR Cryptol. ePrint Arch., 2020

2019
A New Higher Order Differential of BIG.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
Integral Cryptanalysis of Reduced-round KASUMI.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A New Higher Order Differential of FeW.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
New Integral Characteristics of KASUMI Derived by Division Property.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Integral characteristics of MISTY2 derived by division property.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A new higher order differential of DBlock.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A Practical-time Attack on Reduced-round MISTY1.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2014
A New Higher Order Differential of CLEFIA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Differential probability for a component in non-linear function of K2 v2.0.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

A new higher order differential of Camellia.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

A new higher order differential of LBlock.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2012
Some Saturation Characteristics of XOR Sum of Balance Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A peculiar higher order differential of CLEFIA.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2010
On the Strength Evaluation of Lesamnta against Differential Cryptanalysis.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Update on Enocoro stream cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Higher Order Differential Attack on Step-Reduced Variants of <i>Luffa</i> v1.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A Study on Multi-Resipient Encryptions for Selective Disclosure.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Scheduling Algorithm with Power Allocation for Random Unitary Beamforming.
IEICE Trans. Commun., 2008

MIMO Systems in the Presence of Feedback Delay.
IEICE Trans. Commun., 2008

Mapping for Iterative MMSE-SIC with Belief Propagation.
IEICE Trans. Commun., 2008

Cryptographic Approch for Workflow Systems.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008

Enocoro-80: A Hardware Oriented Stream Cipher.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Study on Higher Order Differential Attack of KASUMI.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Special Section on Information Theory and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs.
IEICE Trans. Commun., 2007

Security Analysis of MISTY1.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Low Computational Complexity 2-Dimensional Pilot-Symbol-Assisted (2-D PSA) MMSE Channel Estimation with Extended Estimation Size for MIMO-OFDM Systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Random Beamforming Using Low Feedback and Low Latency Power Allocation.
Proceedings of the 66th IEEE Vehicular Technology Conference, 2007

Throughput Maximization Transmission Control Scheme Using Precoding for MIMO Systems.
Proceedings of IEEE International Conference on Communications, 2007

Precoding for MIMO Systems in Line-Of-Sight (LOS) Environment.
Proceedings of the Global Communications Conference, 2007

2006
Method of Reducing Search Area for Localization in Sensor Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

MMSE Precoder with Mode Selection for MIMO Systems.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Modified Belief Propagation Decoding Algorithm for Low-Density Parity Check Code Based on Oscillation.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Performance of Concatenated Code with LDPC Code and RSC Code.
Proceedings of IEEE International Conference on Communications, 2006

Estimation Method of False Alarm Probability and Observation Noise Variance in Wireless Sensor Networks.
Proceedings of the 9th International Conference on Information Fusion, 2006

A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI.
Proceedings of the Applied Algebra, 2006

2005
A MAC Forgery Attack on SOBER-128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Low complexity source localization algorithms in sensor networks.
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005

2004
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
A Study on Higher Order Differential Attack of Camellia.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

An Optimized Algebraic Method for Higher Order Differential Attack.
Proceedings of the Applied Algebra, 2003

2002
Higher Order Differential Attack of Camellia (II).
Proceedings of the Selected Areas in Cryptography, 2002

2000
Differential Cryptanalysis of Reduced Rounds of GOST.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

On the Strength of KASUMI without FL Functions against Higher Order Differential Attack.
Proceedings of the Information Security and Cryptology, 2000

Performance analysis of linear binary block coded optical PPM CDMA systems with soft-decision decoding.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1999
Interpolation Attacks of the Block Cipher: SNAKE.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials.
Proceedings of the Advances in Cryptology, 1999

Strenght of MISTY1 without FL Function for Higher Order Differential Attack.
Proceedings of the Applied Algebra, 1999

1998
Higher Order Differential Attack Using Chosen Higher Order Differences.
Proceedings of the Selected Areas in Cryptography '98, 1998

Higher Order Differential Attak of CAST Cipher.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES.
Proceedings of the Advances in Cryptology, 1998

1997
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner.
Proceedings of the Information Security, First International Workshop, 1997

Improving the Higher Order Differential Attack and Cryptanalysis of the <i>KN</i> Cipher.
Proceedings of the Information Security, First International Workshop, 1997

1991
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference.
Proceedings of the Advances in Cryptology, 1991


  Loading...