2008 |
16 | EE | Yukiyasu Tsunoo,
Etsuko Tsujihara,
Maki Shigeri,
Teruo Saito,
Tomoyasu Suzaki,
Hiroyasu Kubo:
Impossible Differential Cryptanalysis of CLEFIA.
FSE 2008: 398-411 |
15 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
ICICS 2008: 128-140 |
14 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Maki Shigeri,
Takeshi Kawabata:
Higher Order Differential Attacks on Reduced-Round MISTY1.
ICISC 2008: 415-431 |
13 | EE | Yibo Fan,
Jidong Wang,
Takeshi Ikenaga,
Yukiyasu Tsunoo,
Satoshi Goto:
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard.
IEICE Transactions 91-A(1): 12-21 (2008) |
2007 |
12 | EE | Yibo Fan,
Jidong Wang,
Takeshi Ikenaga,
Yukiyasu Tsunoo,
Satoshi Goto:
A New Video Encryption Scheme for H.264/AVC.
PCM 2007: 246-255 |
11 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Takeshi Kawabata,
Hiroki Nakashima:
Distinguishing Attack Against TPypy.
Selected Areas in Cryptography 2007: 396-407 |
10 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher.
IEEE Transactions on Information Theory 53(11): 4377-4383 (2007) |
9 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Hiroyasu Kubo,
Tomoyasu Suzaki:
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher.
IEEE Transactions on Information Theory 53(9): 3250-3255 (2007) |
2006 |
8 | EE | Kazuhiko Minematsu,
Yukiyasu Tsunoo:
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.
FSE 2006: 226-241 |
7 | EE | Yukiyasu Tsunoo,
Etsuko Tsujihara,
Maki Shigeri,
Hiroyasu Kubo,
Kazuhiko Minematsu:
Improving cache attacks by considering cipher structure.
Int. J. Inf. Sec. 5(3): 166-176 (2006) |
2005 |
6 | EE | Kazuhiko Minematsu,
Yukiyasu Tsunoo:
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components.
ICISC 2005: 242-260 |
5 | EE | Kazuhiko Minematsu,
Yukiyasu Tsunoo:
Expanding Weak PRF with Small Key Size.
ICISC 2005: 284-298 |
4 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Maki Shigeri,
Hiroyasu Kubo,
Kazuhiko Minematsu:
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Transactions on Information Theory 51(12): 4312-4319 (2005) |
2003 |
3 | EE | Yukiyasu Tsunoo,
Teruo Saito,
Tomoyasu Suzaki,
Maki Shigeri,
Hiroshi Miyauchi:
Cryptanalysis of DES Implemented on Computers with Cache.
CHES 2003: 62-76 |
2 | EE | Yukiyasu Tsunoo,
Ryoji Ohta,
Hiroshi Miyauchi,
Katsuhiro Nakamura:
A cipher strength evaluation system based on statistical methods.
Systems and Computers in Japan 34(8): 83-92 (2003) |
1994 |
1 | EE | Yukiyasu Tsunoo,
Eiji Okamoto,
Tomohiko Uyematsu:
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext.
CRYPTO 1994: 369-382 |