2008 |
7 | EE | Stuart Haber,
Yasuo Hatano,
Yoshinori Honda,
William Horne,
Kunihiko Miyazaki,
Tomas Sander,
Satoru Tezoku,
Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
ASIACCS 2008: 353-362 |
6 | EE | Yasuo Hatano,
Kunihiko Miyazaki,
Toshinobu Kaneko:
Cryptographic Approch for Workflow Systems.
II3E 2008: 75-86 |
2007 |
5 | EE | Hidema Tanaka,
Yasuo Hatano,
Nobuyuki Sugio,
Toshinobu Kaneko:
Security Analysis of MISTY1.
WISA 2007: 215-226 |
2005 |
4 | EE | Hiroki Sekine,
Tetsuro Nosaka,
Yasuo Hatano,
Masaki Takeda,
Toshinobu Kaneko:
A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis.
IEICE Transactions 88-A(1): 16-24 (2005) |
2004 |
3 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1.
IEICE Transactions 87-A(1): 18-27 (2004) |
2003 |
2 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
An Optimized Algebraic Method for Higher Order Differential Attack.
AAECC 2003: 61-70 |
2002 |
1 | EE | Yasuo Hatano,
Hiroki Sekine,
Toshinobu Kaneko:
Higher Order Differential Attack of Camellia (II).
Selected Areas in Cryptography 2002: 129-146 |