BibTeX records: Jun Yajima

download as .bib file

@inproceedings{DBLP:conf/cain/TanakaIYOMY24,
  author       = {Hiroshi Tanaka and
                  Masaru Ide and
                  Jun Yajima and
                  Sachiko Onodera and
                  Kazuki Munakata and
                  Nobukazu Yoshioka},
  editor       = {Jane Cleland{-}Huang and
                  Jan Bosch and
                  Henry Muccini and
                  Grace A. Lewis},
  title        = {Taxonomy of Generative {AI} Applications for Risk Assessment},
  booktitle    = {Proceedings of the {IEEE/ACM} 3rd International Conference on {AI}
                  Engineering - Software Engineering for AI, {CAIN} 2024, Lisbon, Portugal,
                  April 14-15, 2024},
  pages        = {288--289},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3644815.3644977},
  doi          = {10.1145/3644815.3644977},
  timestamp    = {Mon, 24 Jun 2024 15:20:25 +0200},
  biburl       = {https://dblp.org/rec/conf/cain/TanakaIYOMY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YajimaIOKTMY23,
  author       = {Jun Yajima and
                  Maki Inui and
                  Takanori Oikawa and
                  Fumiyoshi Kasahara and
                  Kentaro Tsuji and
                  Ikuya Morikawa and
                  Nobukazu Yoshioka},
  title        = {{ASRA-Q:} {AI} Security Risk Assessment by Selective Questions},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {654--666},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.654},
  doi          = {10.2197/IPSJJIP.31.654},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/YajimaIOKTMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cain/YajimaIOKMY22,
  author       = {Jun Yajima and
                  Maki Inui and
                  Takanori Oikawa and
                  Fumiyoshi Kasahara and
                  Ikuya Morikawa and
                  Nobukazu Yoshioka},
  editor       = {Ivica Crnkovic},
  title        = {A new approach for machine learning security risk assessment: work
                  in progress},
  booktitle    = {Proceedings of the 1st International Conference on {AI} Engineering:
                  Software Engineering for AI, {CAIN} 2022, Pittsburgh, Pennsylvania,
                  May 16-17, 2022},
  pages        = {52--53},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3522664.3528613},
  doi          = {10.1145/3522664.3528613},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cain/YajimaIOKMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-14857,
  author       = {Masataka Tasumi and
                  Kazuki Iwahana and
                  Naoto Yanai and
                  Katsunari Shishido and
                  Toshiya Shimizu and
                  Yuji Higuchi and
                  Ikuya Morikawa and
                  Jun Yajima},
  title        = {First to Possess His Statistics: Data-Free Model Extraction Attack
                  on Tabular Data},
  journal      = {CoRR},
  volume       = {abs/2109.14857},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.14857},
  eprinttype    = {arXiv},
  eprint       = {2109.14857},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-14857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/YajimaAHO20,
  author       = {Jun Yajima and
                  Yasuhiko Abe and
                  Takayuki Hasebe and
                  Takao Okubo},
  title        = {Anomaly Detection Method "Cumulative Sum Detection" for
                  In-Vehicle Networks},
  journal      = {J. Inf. Process.},
  volume       = {28},
  pages        = {65--74},
  year         = {2020},
  url          = {https://doi.org/10.2197/ipsjjip.28.65},
  doi          = {10.2197/IPSJJIP.28.65},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/YajimaAHO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/YajimaHO19,
  author       = {Jun Yajima and
                  Takayuki Hasebe and
                  Takao Okubo},
  editor       = {Leonard Barolli and
                  Hiroaki Nishino and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {Data Relation Analysis Focusing on Plural Data Transition for Detecting
                  Attacks on Vehicular Network},
  booktitle    = {Advances in Networked-based Information Systems - The 22nd International
                  Conference on Network-Based Information Systems, NBiS 2019, Oita,
                  Japan, September 5-7, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1036},
  pages        = {270--280},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29029-0\_25},
  doi          = {10.1007/978-3-030-29029-0\_25},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/YajimaHO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/YasudaYSK12,
  author       = {Masaya Yasuda and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Jun Kogure},
  editor       = {Sabrina De Capitani di Vimercati and
                  Chris J. Mitchell},
  title        = {Analysis of Lattice Reduction Attack against the Somewhat Homomorphic
                  Encryption Based on Ideal Lattices},
  booktitle    = {Public Key Infrastructures, Services and Applications - 9th European
                  Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7868},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40012-4\_1},
  doi          = {10.1007/978-3-642-40012-4\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/YasudaYSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/IzuTYY12,
  author       = {Tetsuya Izu and
                  Masahiko Takenaka and
                  Jun Yajima and
                  Takashi Yoshioka},
  editor       = {Ilsun You and
                  Leonard Barolli and
                  Antonio Gentile and
                  Hae{-}Duck Joshua Jeong and
                  Marek R. Ogiela and
                  Fatos Xhafa},
  title        = {Integrity Assurance for Real-Time Video Recording},
  booktitle    = {Sixth International Conference on Innovative Mobile and Internet Services
                  in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012},
  pages        = {651--655},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IMIS.2012.157},
  doi          = {10.1109/IMIS.2012.157},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/IzuTYY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamamotoIY11,
  author       = {Dai Yamamoto and
                  Kouichi Itoh and
                  Jun Yajima},
  title        = {Compact Architecture for {ASIC} and {FPGA} Implementation of the {KASUMI}
                  Block Cipher},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {12},
  pages        = {2628--2638},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.2628},
  doi          = {10.1587/TRANSFUN.E94.A.2628},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamamotoIY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamamotoYI10,
  author       = {Dai Yamamoto and
                  Jun Yajima and
                  Kouichi Itoh},
  title        = {Compact Architecture for {ASIC} Implementation of the {MISTY1} Block
                  Cipher},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {3--12},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.3},
  doi          = {10.1587/TRANSFUN.E93.A.3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamamotoYI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YajimaS10,
  author       = {Jun Yajima and
                  Takeshi Shimoyama},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Matrix Representation of Conditions for the Collision Attack of {SHA-1}
                  and Its Application to the Message Modification},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {267--284},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_18},
  doi          = {10.1007/978-3-642-16825-3\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YajimaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/YamamotoIY10,
  author       = {Dai Yamamoto and
                  Kouichi Itoh and
                  Jun Yajima},
  editor       = {Pierangela Samarati and
                  Michael Tunstall and
                  Joachim Posegga and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A Very Compact Hardware Implementation of the {KASUMI} Block Cipher},
  booktitle    = {Information Security Theory and Practices. Security and Privacy of
                  Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6033},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12368-9\_23},
  doi          = {10.1007/978-3-642-12368-9\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/YamamotoIY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YajimaINSSPKO09,
  author       = {Jun Yajima and
                  Terutoshi Iwasaki and
                  Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Thomas Peyrin and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision
                  Search},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {87--95},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.87},
  doi          = {10.1587/TRANSFUN.E92.A.87},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YajimaINSSPKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ItohYYO09,
  author       = {Kouichi Itoh and
                  Dai Yamamoto and
                  Jun Yajima and
                  Wakaha Ogata},
  title        = {Collision-Based Power Attack for {RSA} with Small Public Exponent},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {5},
  pages        = {897--908},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.897},
  doi          = {10.1587/TRANSINF.E92.D.897},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ItohYYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08,
  author       = {Jun Yajima and
                  Terutoshi Iwasaki and
                  Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {A strict evaluation method on the number of conditions for the {SHA-1}
                  collision search},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {10--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368316},
  doi          = {10.1145/1368310.1368316},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YajimaINSSKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YamamotoYI08,
  author       = {Dai Yamamoto and
                  Jun Yajima and
                  Kouichi Itoh},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Very Compact Hardware Implementation of the {MISTY1} Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {315--330},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_20},
  doi          = {10.1007/978-3-540-85053-3\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YamamotoYI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07,
  author       = {Jun Yajima and
                  Yu Sasaki and
                  Yusuke Naito and
                  Terutoshi Iwasaki and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {A New Strategy for Finding a Differential Path of {SHA-1}},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {45--58},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_4},
  doi          = {10.1007/978-3-540-73458-1\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Jun Yajima and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Improved Collision Search for {SHA-0}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_2},
  doi          = {10.1007/11935230\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaitoSSYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Phong Q. Nguyen},
  title        = {How to Construct Sufficient Conditions for Hash Functions},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_16},
  doi          = {10.1007/11958239\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/SasakiNYSKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSSYKO06,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Jun Yajima and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Message Modification for Step 21-23 on {SHA-0}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoSSYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNYSKO06,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {How to Construct Sufficient Condition in Searching Collisions of {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiNYSKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YajimaS05,
  author       = {Jun Yajima and
                  Takeshi Shimoyama},
  title        = {Wang's sufficient conditions of {MD5} are not sufficient},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YajimaS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ItohYTT02,
  author       = {Kouichi Itoh and
                  Jun Yajima and
                  Masahiko Takenaka and
                  Naoya Torii},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {{DPA} Countermeasures by Improving the Window Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {303--317},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_23},
  doi          = {10.1007/3-540-36400-5\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ItohYTT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ShimoyamaYYTIYTT01,
  author       = {Takeshi Shimoyama and
                  Hitoshi Yanami and
                  Kazuhiro Yokoyama and
                  Masahiko Takenaka and
                  Kouichi Itoh and
                  Jun Yajima and
                  Naoya Torii and
                  Hidema Tanaka},
  editor       = {Mitsuru Matsui},
  title        = {The Block Cipher {SC2000}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {312--327},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_26},
  doi          = {10.1007/3-540-45473-X\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ShimoyamaYYTIYTT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}