Yukiyasu Tsunoo

According to our database1, Yukiyasu Tsunoo authored at least 32 papers between 1994 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Hardware-Trojans Rank: Quantitative Evaluation of Security Threats at Gate-Level Netlists by Pattern Matching.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
A Hardware-Trojans Identifying Method Based on Trojan Net Scoring at Gate-Level Netlists.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
A smaller and faster variant of RSM.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Correlated Noise Reduction for Electromagnetic Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Finding Higher Order Differentials of MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Scheme overcoming incompatibility of privacy and utilization of personal data.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
The Switching Glitch Power Leakage Model.
J. Softw., 2011

A Multiple Bits Output Ring-Oscillator Physical Unclonable Function.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011

Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Correlation Power Analysis Based on Switching Glitch Model.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

2009
Higher Order Differential Attack on 6-Round MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Results of Linear Cryptanalysis Using Linear Sieve Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Higher Order Differential Attacks on Reduced-Round MISTY1.
Proceedings of the Information Security and Cryptology, 2008

Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Impossible Differential Cryptanalysis of CLEFIA.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher.
IEEE Trans. Inf. Theory, 2007

A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher.
IEEE Trans. Inf. Theory, 2007

Distinguishing Attack Against TPypy.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

A New Video Encryption Scheme for H.264/AVC.
Proceedings of the Advances in Multimedia Information Processing, 2007

2006
Improving cache attacks by considering cipher structure.
Int. J. Inf. Sec., 2006

Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Trans. Inf. Theory, 2005

Expanding Weak PRF with Small Key Size.
Proceedings of the Information Security and Cryptology, 2005

Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components.
Proceedings of the Information Security and Cryptology, 2005

2003
A cipher strength evaluation system based on statistical methods.
Syst. Comput. Jpn., 2003

Cryptanalysis of DES Implemented on Computers with Cache.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

1994
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext.
Proceedings of the Advances in Cryptology, 1994


  Loading...