dblp.uni-trier.dewww.uni-trier.de

Yukiyasu Tsunoo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
16EEYukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo: Impossible Differential Cryptanalysis of CLEFIA. FSE 2008: 398-411
15EEYukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. ICICS 2008: 128-140
14EEYukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata: Higher Order Differential Attacks on Reduced-Round MISTY1. ICISC 2008: 415-431
13EEYibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto: An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard. IEICE Transactions 91-A(1): 12-21 (2008)
2007
12EEYibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto: A New Video Encryption Scheme for H.264/AVC. PCM 2007: 246-255
11EEYukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima: Distinguishing Attack Against TPypy. Selected Areas in Cryptography 2007: 396-407
10EEYukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. IEEE Transactions on Information Theory 53(11): 4377-4383 (2007)
9EEYukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. IEEE Transactions on Information Theory 53(9): 3250-3255 (2007)
2006
8EEKazuhiko Minematsu, Yukiyasu Tsunoo: Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. FSE 2006: 226-241
7EEYukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu: Improving cache attacks by considering cipher structure. Int. J. Inf. Sec. 5(3): 166-176 (2006)
2005
6EEKazuhiko Minematsu, Yukiyasu Tsunoo: Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. ICISC 2005: 242-260
5EEKazuhiko Minematsu, Yukiyasu Tsunoo: Expanding Weak PRF with Small Key Size. ICISC 2005: 284-298
4EEYukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu: Shorter bit sequence is enough to break stream cipher LILI-128. IEEE Transactions on Information Theory 51(12): 4312-4319 (2005)
2003
3EEYukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi: Cryptanalysis of DES Implemented on Computers with Cache. CHES 2003: 62-76
2EEYukiyasu Tsunoo, Ryoji Ohta, Hiroshi Miyauchi, Katsuhiro Nakamura: A cipher strength evaluation system based on statistical methods. Systems and Computers in Japan 34(8): 83-92 (2003)
1994
1EEYukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu: Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. CRYPTO 1994: 369-382

Coauthor Index

1Yibo Fan [12] [13]
2Satoshi Goto [12] [13]
3Takeshi Ikenaga [12] [13]
4Takeshi Kawabata [11] [14]
5Hiroyasu Kubo [4] [7] [9] [10] [15] [16]
6Kazuhiko Minematsu [4] [5] [6] [7] [8]
7Hiroshi Miyauchi [2] [3]
8Katsuhiro Nakamura [2]
9Hiroki Nakashima [11]
10Ryoji Ohta [2]
11Eiji Okamoto [1]
12Teruo Saito [3] [4] [9] [10] [11] [14] [15] [16]
13Maki Shigeri [3] [4] [7] [14] [16]
14Tomoyasu Suzaki [3] [9] [10] [15] [16]
15Etsuko Tsujihara [7] [16]
16Tomohiko Uyematsu [1]
17Jidong Wang [12] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)