Yasuo Hatano

According to our database1, Yasuo Hatano authored at least 10 papers between 2002 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Higher Order Differential Attack on Step-Reduced Variants of <i>Luffa</i> v1.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

A Study on Multi-Resipient Encryptions for Selective Disclosure.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Cryptographic Approch for Workflow Systems.
Proceedings of the Towards Sustainable Society on Ubiquitous Networks, 2008

Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Security Analysis of MISTY1.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

2005
A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
An Optimized Algebraic Method for Higher Order Differential Attack.
Proceedings of the Applied Algebra, 2003

2002
Higher Order Differential Attack of Camellia (II).
Proceedings of the Selected Areas in Cryptography, 2002


  Loading...