| 2008 |
| 7 | EE | Stuart Haber,
Yasuo Hatano,
Yoshinori Honda,
William Horne,
Kunihiko Miyazaki,
Tomas Sander,
Satoru Tezoku,
Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
ASIACCS 2008: 353-362 |
| 6 | EE | Yasuo Hatano,
Kunihiko Miyazaki,
Toshinobu Kaneko:
Cryptographic Approch for Workflow Systems.
II3E 2008: 75-86 |
| 2007 |
| 5 | EE | Hidema Tanaka,
Yasuo Hatano,
Nobuyuki Sugio,
Toshinobu Kaneko:
Security Analysis of MISTY1.
WISA 2007: 215-226 |
| 2005 |
| 4 | EE | Hiroki Sekine,
Tetsuro Nosaka,
Yasuo Hatano,
Masaki Takeda,
Toshinobu Kaneko:
A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis.
IEICE Transactions 88-A(1): 16-24 (2005) |
| 2004 |
| 3 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1.
IEICE Transactions 87-A(1): 18-27 (2004) |
| 2003 |
| 2 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
An Optimized Algebraic Method for Higher Order Differential Attack.
AAECC 2003: 61-70 |
| 2002 |
| 1 | EE | Yasuo Hatano,
Hiroki Sekine,
Toshinobu Kaneko:
Higher Order Differential Attack of Camellia (II).
Selected Areas in Cryptography 2002: 129-146 |