| 2008 |
| 34 | EE | Dai Watanabe,
Kota Ideguchi,
Jun Kitahara,
Kenichiro Muto,
Hiroki Furuichi,
Toshinobu Kaneko:
Enocoro-80: A Hardware Oriented Stream Cipher.
ARES 2008: 1294-1300 |
| 33 | EE | Yasuo Hatano,
Kunihiko Miyazaki,
Toshinobu Kaneko:
Cryptographic Approch for Workflow Systems.
II3E 2008: 75-86 |
| 32 | EE | Yuki Tsuchiya,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Scheduling Algorithm with Power Allocation for Random Unitary Beamforming.
IEICE Transactions 91-B(1): 232-238 (2008) |
| 31 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
MIMO Systems in the Presence of Feedback Delay.
IEICE Transactions 91-B(3): 829-836 (2008) |
| 2007 |
| 30 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Precoding for MIMO Systems in Line-Of-Sight (LOS) Environment.
GLOBECOM 2007: 4370-4374 |
| 29 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Throughput Maximization Transmission Control Scheme Using Precoding for MIMO Systems.
ICC 2007: 5098-5102 |
| 28 | EE | Yuki Tsuchiya,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Random Beamforming Using Low Feedback and Low Latency Power Allocation.
VTC Fall 2007: 402-406 |
| 27 | EE | Yuki Tsuchiya,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Scheduling Algorithm with Power Allocation for Random Unitary Beamforming.
VTC Spring 2007: 1668-1672 |
| 26 | EE | Hidema Tanaka,
Yasuo Hatano,
Nobuyuki Sugio,
Toshinobu Kaneko:
Security Analysis of MISTY1.
WISA 2007: 215-226 |
| 25 | EE | Nobuyuki Sugio,
Hiroshi Aono,
Sadayuki Hongo,
Toshinobu Kaneko:
A Study on Higher Order Differential Attack of KASUMI.
IEICE Transactions 90-A(1): 14-21 (2007) |
| 24 | EE | Toshinobu Kaneko:
Special Section on Information Theory and Its Applications.
IEICE Transactions 90-A(9): 1727-1728 (2007) |
| 23 | EE | Kenji Hamano,
Toshinobu Kaneko:
Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite.
IEICE Transactions 90-A(9): 1788-1792 (2007) |
| 22 | EE | Satoshi Gounai,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs.
IEICE Transactions 90-B(3): 569-577 (2007) |
| 2006 |
| 21 | EE | Nobuyuki Sugio,
Shunichi Nambu,
Toshinobu Kaneko:
A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI.
AAECC 2006: 163-172 |
| 20 | EE | Kenichi Kobayashi,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
MMSE Precoder with Mode Selection for MIMO Systems.
VTC Fall 2006: 1-5 |
| 19 | EE | Satoshi Gounai,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Modified Belief Propagation Decoding Algorithm for Low-Density Parity Check Code Based on Oscillation.
VTC Spring 2006: 1467-1471 |
| 18 | EE | Junichi Shirahama,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Method of Reducing Search Area for Localization in Sensor Networks.
VTC Spring 2006: 354-357 |
| 2005 |
| 17 | EE | Junichi Shirahama,
Tomoaki Ohtsuki,
Toshinobu Kaneko:
Low complexity source localization algorithms in sensor networks.
PE-WASUN 2005: 130-136 |
| 16 | EE | Hiroki Sekine,
Tetsuro Nosaka,
Yasuo Hatano,
Masaki Takeda,
Toshinobu Kaneko:
A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis.
IEICE Transactions 88-A(1): 16-24 (2005) |
| 15 | EE | Dai Watanabe,
Soichi Furuya,
Toshinobu Kaneko:
A MAC Forgery Attack on SOBER-128.
IEICE Transactions 88-A(5): 1166-1172 (2005) |
| 2004 |
| 14 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1.
IEICE Transactions 87-A(1): 18-27 (2004) |
| 2003 |
| 13 | EE | Yasuo Hatano,
Hidema Tanaka,
Toshinobu Kaneko:
An Optimized Algebraic Method for Higher Order Differential Attack.
AAECC 2003: 61-70 |
| 2002 |
| 12 | EE | Yasuo Hatano,
Hiroki Sekine,
Toshinobu Kaneko:
Higher Order Differential Attack of Camellia (II).
Selected Areas in Cryptography 2002: 129-146 |
| 2000 |
| 11 | EE | Hidema Tanaka,
Chikashi Ishii,
Toshinobu Kaneko:
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack.
ICISC 2000: 14-21 |
| 10 | EE | Haruki Seki,
Toshinobu Kaneko:
Differential Cryptanalysis of Reduced Rounds of GOST.
Selected Areas in Cryptography 2000: 315-323 |
| 1999 |
| 9 | | Hidema Tanaka,
Kazuyuki Hisamatsu,
Toshinobu Kaneko:
Strenght of MISTY1 without FL Function for Higher Order Differential Attack.
AAECC 1999: 221-230 |
| 8 | | Haruki Seki,
Toshinobu Kaneko:
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials.
ASIACRYPT 1999: 43-51 |
| 7 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Interpolation Attacks of the Block Cipher: SNAKE.
FSE 1999: 275-289 |
| 1998 |
| 6 | EE | Takeshi Shimoyama,
Toshinobu Kaneko:
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES.
CRYPTO 1998: 200-211 |
| 5 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Higher Order Differential Attak of CAST Cipher.
FSE 1998: 17-31 |
| 4 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Higher Order Differential Attack Using Chosen Higher Order Differences.
Selected Areas in Cryptography 1998: 106-117 |
| 1997 |
| 3 | | Takeshi Shimoyama,
Shiho Moriai,
Toshinobu Kaneko:
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher.
ISW 1997: 32-42 |
| 2 | | Hidema Tanaka,
Tomoya Ohishi,
Toshinobu Kaneko:
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner.
ISW 1997: 43-54 |
| 1991 |
| 1 | | Toshinobu Kaneko:
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference.
ASIACRYPT 1991: 485-488 |