2008 |
8 | EE | Yukiyasu Tsunoo,
Etsuko Tsujihara,
Maki Shigeri,
Teruo Saito,
Tomoyasu Suzaki,
Hiroyasu Kubo:
Impossible Differential Cryptanalysis of CLEFIA.
FSE 2008: 398-411 |
7 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
ICICS 2008: 128-140 |
6 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Maki Shigeri,
Takeshi Kawabata:
Higher Order Differential Attacks on Reduced-Round MISTY1.
ICISC 2008: 415-431 |
2007 |
5 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Takeshi Kawabata,
Hiroki Nakashima:
Distinguishing Attack Against TPypy.
Selected Areas in Cryptography 2007: 396-407 |
4 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher.
IEEE Transactions on Information Theory 53(11): 4377-4383 (2007) |
3 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher.
IEEE Transactions on Information Theory 53(9): 3250-3255 (2007) |
2005 |
2 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Maki Shigeri,
Hiroyasu Kubo,
Kazuhiko Minematsu:
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Transactions on Information Theory 51(12): 4312-4319 (2005) |
2003 |
1 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Tomoyasu Suzaki,
Maki Shigeri,
Hiroshi Miyauchi:
Cryptanalysis of DES Implemented on Computers with Cache.
CHES 2003: 62-76 |