Yukiyasu Tsunoo

From MaRDI portal
Person:3013016



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster)
Information Security and Privacy
2011-07-07Paper
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
Fast Software Encryption
2009-04-02Paper
Shorter Bit Sequence Is Enough to Break Stream Cipher LILI-128
IEEE Transactions on Information Theory
2008-12-21Paper
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher
IEEE Transactions on Information Theory
2008-12-21Paper
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher
IEEE Transactions on Information Theory
2008-12-21Paper
Impossible Differential Cryptanalysis of CLEFIA
Fast Software Encryption
2008-09-18Paper
Distinguishing Attack Against TPypy
Selected Areas in Cryptography
2008-03-25Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
scientific article; zbMATH DE number 1406794 (Why is no real title available?)2000-03-01Paper


Research outcomes over time


This page was built for person: Yukiyasu Tsunoo