2008 |
34 | EE | Dai Watanabe,
Kota Ideguchi,
Jun Kitahara,
Kenichiro Muto,
Hiroki Furuichi,
Toshinobu Kaneko:
Enocoro-80: A Hardware Oriented Stream Cipher.
ARES 2008: 1294-1300 |
33 | EE | Yasuo Hatano,
Kunihiko Miyazaki,
Toshinobu Kaneko:
Cryptographic Approch for Workflow Systems.
II3E 2008: 75-86 |
32 | EE | Yuki Tsuchiya,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Scheduling Algorithm with Power Allocation for Random Unitary Beamforming.
IEICE Transactions 91-B(1): 232-238 (2008) |
31 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
MIMO Systems in the Presence of Feedback Delay.
IEICE Transactions 91-B(3): 829-836 (2008) |
2007 |
30 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Precoding for MIMO Systems in Line-Of-Sight (LOS) Environment.
GLOBECOM 2007: 4370-4374 |
29 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Throughput Maximization Transmission Control Scheme Using Precoding for MIMO Systems.
ICC 2007: 5098-5102 |
28 | EE | Yuki Tsuchiya,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Random Beamforming Using Low Feedback and Low Latency Power Allocation.
VTC Fall 2007: 402-406 |
27 | EE | Yuki Tsuchiya,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Scheduling Algorithm with Power Allocation for Random Unitary Beamforming.
VTC Spring 2007: 1668-1672 |
26 | EE | Hidema Tanaka,
Yasuo Hatano,
Nobuyuki Sugio,
Toshinobu Kaneko:
Security Analysis of MISTY1.
WISA 2007: 215-226 |
25 | EE | Nobuyuki Sugio,
Hiroshi Aono,
Sadayuki Hongo,
Toshinobu Kaneko:
A Study on Higher Order Differential Attack of KASUMI.
IEICE Transactions 90-A(1): 14-21 (2007) |
24 | EE | Toshinobu Kaneko:
Special Section on Information Theory and Its Applications.
IEICE Transactions 90-A(9): 1727-1728 (2007) |
23 | EE | Kenji Hamano,
Toshinobu Kaneko:
Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite.
IEICE Transactions 90-A(9): 1788-1792 (2007) |
22 | EE | Satoshi Gounai,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs.
IEICE Transactions 90-B(3): 569-577 (2007) |
2006 |
21 | EE | Nobuyuki Sugio,
Shunichi Nambu,
Toshinobu Kaneko:
A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI.
AAECC 2006: 163-172 |
20 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
MMSE Precoder with Mode Selection for MIMO Systems.
VTC Fall 2006: 1-5 |
19 | EE | Satoshi Gounai,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Modified Belief Propagation Decoding Algorithm for Low-Density Parity Check Code Based on Oscillation.
VTC Spring 2006: 1467-1471 |
18 | EE | Junichi Shirahama,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Method of Reducing Search Area for Localization in Sensor Networks.
VTC Spring 2006: 354-357 |
2005 |
17 | EE | Junichi Shirahama,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Low complexity source localization algorithms in sensor networks.
PE-WASUN 2005: 130-136 |
16 | EE | Hiroki Sekine,
Tetsuro Nosaka,
Yasuo Hatano,
Masaki Takeda,
Toshinobu Kaneko:
A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis.
IEICE Transactions 88-A(1): 16-24 (2005) |
15 | EE | Dai Watanabe,
Soichi Furuya,
Toshinobu Kaneko:
A MAC Forgery Attack on SOBER-128.
IEICE Transactions 88-A(5): 1166-1172 (2005) |
2004 |
14 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1.
IEICE Transactions 87-A(1): 18-27 (2004) |
2003 |
13 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
An Optimized Algebraic Method for Higher Order Differential Attack.
AAECC 2003: 61-70 |
2002 |
12 | EE | Yasuo Hatano,
Hiroki Sekine,
Toshinobu Kaneko:
Higher Order Differential Attack of Camellia (II).
Selected Areas in Cryptography 2002: 129-146 |
2000 |
11 | EE | Hidema Tanaka,
Chikashi Ishii,
Toshinobu Kaneko:
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack.
ICISC 2000: 14-21 |
10 | EE | Haruki Seki,
Toshinobu Kaneko:
Differential Cryptanalysis of Reduced Rounds of GOST.
Selected Areas in Cryptography 2000: 315-323 |
1999 |
9 | | Hidema Tanaka,
Kazuyuki Hisamatsu,
Toshinobu Kaneko:
Strenght of MISTY1 without FL Function for Higher Order Differential Attack.
AAECC 1999: 221-230 |
8 | | Haruki Seki,
Toshinobu Kaneko:
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials.
ASIACRYPT 1999: 43-51 |
7 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Interpolation Attacks of the Block Cipher: SNAKE.
FSE 1999: 275-289 |
1998 |
6 | EE | Takeshi Shimoyama,
Toshinobu Kaneko:
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES.
CRYPTO 1998: 200-211 |
5 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Higher Order Differential Attak of CAST Cipher.
FSE 1998: 17-31 |
4 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Higher Order Differential Attack Using Chosen Higher Order Differences.
Selected Areas in Cryptography 1998: 106-117 |
1997 |
3 | | Takeshi Shimoyama,
Shiho Moriai,
Toshinobu Kaneko:
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher.
ISW 1997: 32-42 |
2 | | Hidema Tanaka,
Tomoya Ohishi,
Toshinobu Kaneko:
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner.
ISW 1997: 43-54 |
1991 |
1 | | Toshinobu Kaneko:
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference.
ASIACRYPT 1991: 485-488 |