dblp.uni-trier.dewww.uni-trier.de

Teruo Saito

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
8EEYukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo: Impossible Differential Cryptanalysis of CLEFIA. FSE 2008: 398-411
7EEYukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. ICICS 2008: 128-140
6EEYukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata: Higher Order Differential Attacks on Reduced-Round MISTY1. ICISC 2008: 415-431
2007
5EEYukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima: Distinguishing Attack Against TPypy. Selected Areas in Cryptography 2007: 396-407
4EEYukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. IEEE Transactions on Information Theory 53(11): 4377-4383 (2007)
3EEYukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. IEEE Transactions on Information Theory 53(9): 3250-3255 (2007)
2005
2EEYukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu: Shorter bit sequence is enough to break stream cipher LILI-128. IEEE Transactions on Information Theory 51(12): 4312-4319 (2005)
2003
1EEYukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi: Cryptanalysis of DES Implemented on Computers with Cache. CHES 2003: 62-76

Coauthor Index

1Takeshi Kawabata [5] [6]
2Hiroyasu Kubo [2] [3] [4] [7] [8]
3Kazuhiko Minematsu [2]
4Hiroshi Miyauchi [1]
5Hiroki Nakashima [5]
6Maki Shigeri [1] [2] [6] [8]
7Tomoyasu Suzaki [1] [3] [4] [7] [8]
8Etsuko Tsujihara [8]
9Yukiyasu Tsunoo [1] [2] [3] [4] [5] [6] [7] [8]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)