BibTeX records: Tomoyasu Suzaki

download as .bib file

@inproceedings{DBLP:conf/sacrypt/SuzakiMMK12,
  author       = {Tomoyasu Suzaki and
                  Kazuhiko Minematsu and
                  Sumio Morioka and
                  Eita Kobayashi},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {{\textdollar}{\textbackslash}textnormal\{{\textbackslash}textsc\{TWINE\}\}{\textdollar}
                  : {A} Lightweight Block Cipher for Multiple Platforms},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {339--354},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_22},
  doi          = {10.1007/978-3-642-35999-6\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SuzakiMMK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MinematsuSS11,
  author       = {Kazuhiko Minematsu and
                  Tomoyasu Suzaki and
                  Maki Shigeri},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {On Maximum Differential Probability of Generalized Feistel},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {89--105},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_7},
  doi          = {10.1007/978-3-642-22497-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MinematsuSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TsunooKSKS10,
  author       = {Yukiyasu Tsunoo and
                  Takeshi Kawabata and
                  Tomoyasu Suzaki and
                  Hiroyasu Kubo and
                  Teruo Saito},
  title        = {Access-Driven Cache Attack on the Stream Cipher {DICING} Using the
                  Chosen {IV}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {4},
  pages        = {799--807},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.799},
  doi          = {10.1587/TRANSFUN.E93.A.799},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TsunooKSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SuzakiM10,
  author       = {Tomoyasu Suzaki and
                  Kazuhiko Minematsu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Improving the Generalized Feistel},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {19--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_2},
  doi          = {10.1007/978-3-642-13858-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SuzakiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/TsunooTSSSK08,
  author       = {Yukiyasu Tsunoo and
                  Etsuko Tsujihara and
                  Maki Shigeri and
                  Teruo Saito and
                  Tomoyasu Suzaki and
                  Hiroyasu Kubo},
  editor       = {Kaisa Nyberg},
  title        = {Impossible Differential Cryptanalysis of {CLEFIA}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_25},
  doi          = {10.1007/978-3-540-71039-4\_25},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/TsunooTSSSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TsunooSKS08,
  author       = {Yukiyasu Tsunoo and
                  Teruo Saito and
                  Hiroyasu Kubo and
                  Tomoyasu Suzaki},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_9},
  doi          = {10.1007/978-3-540-88625-9\_9},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TsunooSKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TsunooSKS07,
  author       = {Yukiyasu Tsunoo and
                  Teruo Saito and
                  Hiroyasu Kubo and
                  Tomoyasu Suzaki},
  title        = {A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream
                  Cipher},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {9},
  pages        = {3250--3255},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.903136},
  doi          = {10.1109/TIT.2007.903136},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/TsunooSKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TsunooSKS07a,
  author       = {Yukiyasu Tsunoo and
                  Teruo Saito and
                  Hiroyasu Kubo and
                  Tomoyasu Suzaki},
  title        = {Cryptanalysis of Mir-1: {A} T-Function-Based Stream Cipher},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {11},
  pages        = {4377--4383},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.907340},
  doi          = {10.1109/TIT.2007.907340},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/TsunooSKS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TsunooSSSM03,
  author       = {Yukiyasu Tsunoo and
                  Teruo Saito and
                  Tomoyasu Suzaki and
                  Maki Shigeri and
                  Hiroshi Miyauchi},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptanalysis of {DES} Implemented on Computers with Cache},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {62--76},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_6},
  doi          = {10.1007/978-3-540-45238-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TsunooSSSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics