default search action
BibTeX records: Jun Yajima
@inproceedings{DBLP:conf/cain/TanakaIYOMY24, author = {Hiroshi Tanaka and Masaru Ide and Jun Yajima and Sachiko Onodera and Kazuki Munakata and Nobukazu Yoshioka}, editor = {Jane Cleland{-}Huang and Jan Bosch and Henry Muccini and Grace A. Lewis}, title = {Taxonomy of Generative {AI} Applications for Risk Assessment}, booktitle = {Proceedings of the {IEEE/ACM} 3rd International Conference on {AI} Engineering - Software Engineering for AI, {CAIN} 2024, Lisbon, Portugal, April 14-15, 2024}, pages = {288--289}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3644815.3644977}, doi = {10.1145/3644815.3644977}, timestamp = {Mon, 24 Jun 2024 15:20:25 +0200}, biburl = {https://dblp.org/rec/conf/cain/TanakaIYOMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YajimaIOKTMY23, author = {Jun Yajima and Maki Inui and Takanori Oikawa and Fumiyoshi Kasahara and Kentaro Tsuji and Ikuya Morikawa and Nobukazu Yoshioka}, title = {{ASRA-Q:} {AI} Security Risk Assessment by Selective Questions}, journal = {J. Inf. Process.}, volume = {31}, pages = {654--666}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.654}, doi = {10.2197/IPSJJIP.31.654}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/YajimaIOKTMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cain/YajimaIOKMY22, author = {Jun Yajima and Maki Inui and Takanori Oikawa and Fumiyoshi Kasahara and Ikuya Morikawa and Nobukazu Yoshioka}, editor = {Ivica Crnkovic}, title = {A new approach for machine learning security risk assessment: work in progress}, booktitle = {Proceedings of the 1st International Conference on {AI} Engineering: Software Engineering for AI, {CAIN} 2022, Pittsburgh, Pennsylvania, May 16-17, 2022}, pages = {52--53}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3522664.3528613}, doi = {10.1145/3522664.3528613}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cain/YajimaIOKMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-14857, author = {Masataka Tasumi and Kazuki Iwahana and Naoto Yanai and Katsunari Shishido and Toshiya Shimizu and Yuji Higuchi and Ikuya Morikawa and Jun Yajima}, title = {First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data}, journal = {CoRR}, volume = {abs/2109.14857}, year = {2021}, url = {https://arxiv.org/abs/2109.14857}, eprinttype = {arXiv}, eprint = {2109.14857}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-14857.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/YajimaAHO20, author = {Jun Yajima and Yasuhiko Abe and Takayuki Hasebe and Takao Okubo}, title = {Anomaly Detection Method "Cumulative Sum Detection" for In-Vehicle Networks}, journal = {J. Inf. Process.}, volume = {28}, pages = {65--74}, year = {2020}, url = {https://doi.org/10.2197/ipsjjip.28.65}, doi = {10.2197/IPSJJIP.28.65}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/YajimaAHO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/YajimaHO19, author = {Jun Yajima and Takayuki Hasebe and Takao Okubo}, editor = {Leonard Barolli and Hiroaki Nishino and Tomoya Enokido and Makoto Takizawa}, title = {Data Relation Analysis Focusing on Plural Data Transition for Detecting Attacks on Vehicular Network}, booktitle = {Advances in Networked-based Information Systems - The 22nd International Conference on Network-Based Information Systems, NBiS 2019, Oita, Japan, September 5-7, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1036}, pages = {270--280}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29029-0\_25}, doi = {10.1007/978-3-030-29029-0\_25}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/YajimaHO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/YasudaYSK12, author = {Masaya Yasuda and Jun Yajima and Takeshi Shimoyama and Jun Kogure}, editor = {Sabrina De Capitani di Vimercati and Chris J. Mitchell}, title = {Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices}, booktitle = {Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7868}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40012-4\_1}, doi = {10.1007/978-3-642-40012-4\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/YasudaYSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/IzuTYY12, author = {Tetsuya Izu and Masahiko Takenaka and Jun Yajima and Takashi Yoshioka}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {Integrity Assurance for Real-Time Video Recording}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {651--655}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.157}, doi = {10.1109/IMIS.2012.157}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/IzuTYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamamotoIY11, author = {Dai Yamamoto and Kouichi Itoh and Jun Yajima}, title = {Compact Architecture for {ASIC} and {FPGA} Implementation of the {KASUMI} Block Cipher}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {12}, pages = {2628--2638}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.2628}, doi = {10.1587/TRANSFUN.E94.A.2628}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamamotoIY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamamotoYI10, author = {Dai Yamamoto and Jun Yajima and Kouichi Itoh}, title = {Compact Architecture for {ASIC} Implementation of the {MISTY1} Block Cipher}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {3--12}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.3}, doi = {10.1587/TRANSFUN.E93.A.3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamamotoYI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YajimaS10, author = {Jun Yajima and Takeshi Shimoyama}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Matrix Representation of Conditions for the Collision Attack of {SHA-1} and Its Application to the Message Modification}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {267--284}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_18}, doi = {10.1007/978-3-642-16825-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YajimaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/YamamotoIY10, author = {Dai Yamamoto and Kouichi Itoh and Jun Yajima}, editor = {Pierangela Samarati and Michael Tunstall and Joachim Posegga and Konstantinos Markantonakis and Damien Sauveron}, title = {A Very Compact Hardware Implementation of the {KASUMI} Block Cipher}, booktitle = {Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2010, Passau, Germany, April 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6033}, pages = {293--307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12368-9\_23}, doi = {10.1007/978-3-642-12368-9\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/YamamotoIY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YajimaINSSPKO09, author = {Jun Yajima and Terutoshi Iwasaki and Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Thomas Peyrin and Noboru Kunihiro and Kazuo Ohta}, title = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision Search}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {87--95}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.87}, doi = {10.1587/TRANSFUN.E92.A.87}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YajimaINSSPKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ItohYYO09, author = {Kouichi Itoh and Dai Yamamoto and Jun Yajima and Wakaha Ogata}, title = {Collision-Based Power Attack for {RSA} with Small Public Exponent}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {5}, pages = {897--908}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.897}, doi = {10.1587/TRANSINF.E92.D.897}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ItohYYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08, author = {Jun Yajima and Terutoshi Iwasaki and Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {A strict evaluation method on the number of conditions for the {SHA-1} collision search}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {10--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368316}, doi = {10.1145/1368310.1368316}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YajimaINSSKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YamamotoYI08, author = {Dai Yamamoto and Jun Yajima and Kouichi Itoh}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A Very Compact Hardware Implementation of the {MISTY1} Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {315--330}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_20}, doi = {10.1007/978-3-540-85053-3\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YamamotoYI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07, author = {Jun Yajima and Yu Sasaki and Yusuke Naito and Terutoshi Iwasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A New Strategy for Finding a Differential Path of {SHA-1}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {45--58}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_4}, doi = {10.1007/978-3-540-73458-1\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06, author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta}, editor = {Xuejia Lai and Kefei Chen}, title = {Improved Collision Search for {SHA-0}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {21--36}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_2}, doi = {10.1007/11935230\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NaitoSSYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06, author = {Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Phong Q. Nguyen}, title = {How to Construct Sufficient Conditions for Hash Functions}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {243--259}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_16}, doi = {10.1007/11958239\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/SasakiNYSKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoSSYKO06, author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta}, title = {Message Modification for Step 21-23 on {SHA-0}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2006}, url = {http://eprint.iacr.org/2006/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoSSYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasakiNYSKO06, author = {Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, title = {How to Construct Sufficient Condition in Searching Collisions of {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2006}, url = {http://eprint.iacr.org/2006/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasakiNYSKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YajimaS05, author = {Jun Yajima and Takeshi Shimoyama}, title = {Wang's sufficient conditions of {MD5} are not sufficient}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2005}, url = {http://eprint.iacr.org/2005/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YajimaS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ItohYTT02, author = {Kouichi Itoh and Jun Yajima and Masahiko Takenaka and Naoya Torii}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {{DPA} Countermeasures by Improving the Window Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {303--317}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_23}, doi = {10.1007/3-540-36400-5\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ItohYTT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ShimoyamaYYTIYTT01, author = {Takeshi Shimoyama and Hitoshi Yanami and Kazuhiro Yokoyama and Masahiko Takenaka and Kouichi Itoh and Jun Yajima and Naoya Torii and Hidema Tanaka}, editor = {Mitsuru Matsui}, title = {The Block Cipher {SC2000}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {312--327}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_26}, doi = {10.1007/3-540-45473-X\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ShimoyamaYYTIYTT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.