dblp.uni-trier.dewww.uni-trier.de

Hidema Tanaka

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEHidema Tanaka: Linearization Method and Linear Complexity. IEICE Transactions 91-A(1): 22-29 (2008)
12EEYasumasa Hirai, Takashi Kurokawa, Shin'ichiro Matsuo, Hidema Tanaka, Akihiro Yamamura: Classification of Hash Functions Suitable for Real-Life Systems. IEICE Transactions 91-A(1): 64-73 (2008)
11EEHidema Tanaka: Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest. IEICE Transactions 91-D(5): 1439-1446 (2008)
2007
10EEHidema Tanaka: Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. ICISS 2007: 167-179
9EEHidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko: Security Analysis of MISTY1. WISA 2007: 215-226
2005
8EEDuong Viet, Akihiro Yamamura, Hidema Tanaka: Anonymous Password-Based Authenticated Key Exchange. INDOCRYPT 2005: 244-257
2004
7EEHidema Tanaka, Osamu Takizawa, Akihiro Yamamura: Evaluation and Improvement of the Tempest Fonts. WISA 2004: 457-469
6EEYasuo Hatano, Hidema Tanaka, Toshinobu Kaneko: Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. IEICE Transactions 87-A(1): 18-27 (2004)
2003
5EEYasuo Hatano, Hidema Tanaka, Toshinobu Kaneko: An Optimized Algebraic Method for Higher Order Differential Attack. AAECC 2003: 61-70
2001
4EETakeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka: The Block Cipher SC2000. FSE 2001: 312-327
2000
3EEHidema Tanaka, Chikashi Ishii, Toshinobu Kaneko: On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. ICISC 2000: 14-21
1999
2 Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko: Strenght of MISTY1 without FL Function for Higher Order Differential Attack. AAECC 1999: 221-230
1997
1 Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko: An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. ISW 1997: 43-54

Coauthor Index

1Yasuo Hatano [5] [6] [9]
2Yasumasa Hirai [12]
3Kazuyuki Hisamatsu [2]
4Chikashi Ishii [3]
5Kouichi Itoh [4]
6Toshinobu Kaneko [1] [2] [3] [5] [6] [9]
7Takashi Kurokawa [12]
8Shin'ichiro Matsuo [12]
9Tomoya Ohishi [1]
10Takeshi Shimoyama [4]
11Nobuyuki Sugio [9]
12Masahiko Takenaka [4]
13Osamu Takizawa [7]
14Naoya Torii [4]
15Duong Viet [8]
16Jun Yajima [4]
17Akihiro Yamamura [7] [8] [12]
18Hitoshi Yanami [4]
19Kazuhiro Yokoyama [4]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)