Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tomoyasu Suzaki
@inproceedings{DBLP:conf/sacrypt/SuzakiMMK12, author = {Tomoyasu Suzaki and Kazuhiko Minematsu and Sumio Morioka and Eita Kobayashi}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {{\textdollar}{\textbackslash}textnormal\{{\textbackslash}textsc\{TWINE\}\}{\textdollar} : {A} Lightweight Block Cipher for Multiple Platforms}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {339--354}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_22}, doi = {10.1007/978-3-642-35999-6\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SuzakiMMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MinematsuSS11, author = {Kazuhiko Minematsu and Tomoyasu Suzaki and Maki Shigeri}, editor = {Udaya Parampalli and Philip Hawkes}, title = {On Maximum Differential Probability of Generalized Feistel}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {89--105}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_7}, doi = {10.1007/978-3-642-22497-3\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MinematsuSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TsunooKSKS10, author = {Yukiyasu Tsunoo and Takeshi Kawabata and Tomoyasu Suzaki and Hiroyasu Kubo and Teruo Saito}, title = {Access-Driven Cache Attack on the Stream Cipher {DICING} Using the Chosen {IV}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {4}, pages = {799--807}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.799}, doi = {10.1587/TRANSFUN.E93.A.799}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TsunooKSKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SuzakiM10, author = {Tomoyasu Suzaki and Kazuhiko Minematsu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Improving the Generalized Feistel}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {19--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_2}, doi = {10.1007/978-3-642-13858-4\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/SuzakiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/TsunooTSSSK08, author = {Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri and Teruo Saito and Tomoyasu Suzaki and Hiroyasu Kubo}, editor = {Kaisa Nyberg}, title = {Impossible Differential Cryptanalysis of {CLEFIA}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {398--411}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_25}, doi = {10.1007/978-3-540-71039-4\_25}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/TsunooTSSSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TsunooSKS08, author = {Yukiyasu Tsunoo and Teruo Saito and Hiroyasu Kubo and Tomoyasu Suzaki}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {128--140}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_9}, doi = {10.1007/978-3-540-88625-9\_9}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/TsunooSKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TsunooSKS07, author = {Yukiyasu Tsunoo and Teruo Saito and Hiroyasu Kubo and Tomoyasu Suzaki}, title = {A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {9}, pages = {3250--3255}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.903136}, doi = {10.1109/TIT.2007.903136}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/TsunooSKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TsunooSKS07a, author = {Yukiyasu Tsunoo and Teruo Saito and Hiroyasu Kubo and Tomoyasu Suzaki}, title = {Cryptanalysis of Mir-1: {A} T-Function-Based Stream Cipher}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {11}, pages = {4377--4383}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.907340}, doi = {10.1109/TIT.2007.907340}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/TsunooSKS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TsunooSSSM03, author = {Yukiyasu Tsunoo and Teruo Saito and Tomoyasu Suzaki and Maki Shigeri and Hiroshi Miyauchi}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptanalysis of {DES} Implemented on Computers with Cache}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {62--76}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_6}, doi = {10.1007/978-3-540-45238-6\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/TsunooSSSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.