2008 |
6 | EE | Yukiyasu Tsunoo,
Etsuko Tsujihara,
Maki Shigeri,
Teruo Saito,
Tomoyasu Suzaki,
Hiroyasu Kubo:
Impossible Differential Cryptanalysis of CLEFIA.
FSE 2008: 398-411 |
5 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
ICICS 2008: 128-140 |
2007 |
4 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher.
IEEE Transactions on Information Theory 53(11): 4377-4383 (2007) |
3 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher.
IEEE Transactions on Information Theory 53(9): 3250-3255 (2007) |
2006 |
2 | EE | Yukiyasu Tsunoo,
Etsuko Tsujihara,
Maki Shigeri,
Hiroyasu Kubo,
Kazuhiko Minematsu:
Improving cache attacks by considering cipher structure.
Int. J. Inf. Sec. 5(3): 166-176 (2006) |
2005 |
1 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Maki Shigeri,
Hiroyasu Kubo,
Kazuhiko Minematsu:
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Transactions on Information Theory 51(12): 4312-4319 (2005) |