Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hirotaka Yoshida
@article{DBLP:journals/access/KawanishiNYYI23, author = {Yasuyuki Kawanishi and Hideaki Nishihara and Hirotaka Yoshida and Hideki Yamamoto and Hiroyuki Inoue}, title = {A Study on Threat Analysis and Risk Assessment Based on the "Asset Container" Method and {CWSS}}, journal = {{IEEE} Access}, volume = {11}, pages = {18148--18156}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3246497}, doi = {10.1109/ACCESS.2023.3246497}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KawanishiNYYI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/KawanishiNYYI23, author = {Yasuyuki Kawanishi and Hideaki Nishihara and Hideki Yamamoto and Hirotaka Yoshida and Hiroyuki Inoue}, title = {A Study of The Risk Quantification Method of Cyber-Physical Systems focusing on Direct-Access Attacks to In-Vehicle Networks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {341--349}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022cip0004}, doi = {10.1587/TRANSFUN.2022CIP0004}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/KawanishiNYYI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ShinOFIY22, author = {SeongHan Shin and Tomoyuki Ogawa and Ryo Fujita and Mari Itoh and Hirotaka Yoshida}, title = {An Investigation of {PSA} Certified}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {97:1--97:8}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3544452}, doi = {10.1145/3538969.3544452}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ShinOFIY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-06223, author = {Hideaki Nishihara and Yasuyuki Kawanishi and Daisuke Souma and Hirotaka Yoshida}, title = {On Validating Attack Trees with Attack Effects: An Approach from Barwise-Seligman's Channel Theory}, journal = {CoRR}, volume = {abs/2204.06223}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.06223}, doi = {10.48550/ARXIV.2204.06223}, eprinttype = {arXiv}, eprint = {2204.06223}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-06223.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeYY22, author = {Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida}, title = {Performance Evaluation of {NIST} {LWC} Finalists on {AVR} ATmega and {ARM} Cortex-M3 Microcontrollers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1071}, year = {2022}, url = {https://eprint.iacr.org/2022/1071}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/HiroseSY21, author = {Shoichi Hirose and Yu Sasaki and Hirotaka Yoshida}, title = {Update on Analysis of Lesamnta-LW and New {PRF} Mode {LRF}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1304--1320}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020eap1109}, doi = {10.1587/TRANSFUN.2020EAP1109}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/HiroseSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/HiroseKY21, author = {Shoichi Hirose and Hidenori Kuwakado and Hirotaka Yoshida}, title = {Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {104-D}, number = {11}, pages = {1894--1901}, year = {2021}, url = {https://doi.org/10.1587/transinf.2021ngp0008}, doi = {10.1587/TRANSINF.2021NGP0008}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/HiroseKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HellJMMY21, author = {Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida}, editor = {Mauro Conti and Marc Stevens and Stephan Krenn}, title = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction}, booktitle = {Cryptology and Network Security - 20th International Conference, {CANS} 2021, Vienna, Austria, December 13-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13099}, pages = {24--41}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92548-2\_2}, doi = {10.1007/978-3-030-92548-2\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/HellJMMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/KawanishiNYH21, author = {Yasuyuki Kawanishi and Hideaki Nishihara and Hirotaka Yoshida and Yoichi Hata}, title = {A Study of The Risk Quantification Method focusing on Direct-Access Attacks in Cyber-Physical Systems}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, pages = {298--305}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00059}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00059}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/KawanishiNYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HellJMMY21, author = {Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida}, title = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2021}, url = {https://eprint.iacr.org/2021/751}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HellJMMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeYY20, author = {Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida}, title = {Towards Minimizing {RAM} Requirement for Implementation of Grain-128a on {ARM} Cortex-M3}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {2--10}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_2}, doi = {10.1587/TRANSFUN.2019CIP0025}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WatanabeYY20, author = {Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida}, title = {Lightweight Crypto Stack for {TPMS} Using Lesamnta-LW}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {5738215:1--5738215:12}, year = {2020}, url = {https://doi.org/10.1155/2020/5738215}, doi = {10.1155/2020/5738215}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WatanabeYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HiroseSY20, author = {Shoichi Hirose and Yu Sasaki and Hirotaka Yoshida}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New {PRF} Mode}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {89--109}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_5}, doi = {10.1007/978-3-030-57808-4\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HiroseSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/NishiharaKSY20, author = {Hideaki Nishihara and Yasuyuki Kawanishi and Daisuke Souma and Hirotaka Yoshida}, editor = {Ant{\'{o}}nio Casimiro and Frank Ortmeier and Friedemann Bitsch and Pedro Ferreira}, title = {On Validating Attack Trees with Attack Effects}, booktitle = {Computer Safety, Reliability, and Security - 39th International Conference, {SAFECOMP} 2020, Lisbon, Portugal, September 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12234}, pages = {309--324}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54549-9\_21}, doi = {10.1007/978-3-030-54549-9\_21}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/NishiharaKSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KawanishiNSYH19, author = {Yasuyuki Kawanishi and Hideaki Nishihara and Daisuke Souma and Hirotaka Yoshida and Yoichi Hata}, title = {A Comparative Study of {JASO} TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4614721:1--4614721:35}, year = {2019}, url = {https://doi.org/10.1155/2019/4614721}, doi = {10.1155/2019/4614721}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KawanishiNSYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/Hell0MSY19, author = {Martin Hell and Thomas Johansson and Willi Meier and Jonathan S{\"{o}}nnerup and Hirotaka Yoshida}, editor = {Claude Carlet and Sylvain Guilley and Abderrahmane Nitaj and El Mamoun Souidi}, title = {An {AEAD} Variant of the Grain Stream Cipher}, booktitle = {Codes, Cryptology and Information Security - Third International Conference, {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji}, series = {Lecture Notes in Computer Science}, volume = {11445}, pages = {55--71}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16458-4\_5}, doi = {10.1007/978-3-030-16458-4\_5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/c2si/Hell0MSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HiroseKY19, author = {Shoichi Hirose and Hidenori Kuwakado and Hirotaka Yoshida}, editor = {Jae Hong Seo}, title = {Authenticated Encryption Based on Lesamnta-LW Hashing Mode}, booktitle = {Information Security and Cryptology - {ICISC} 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11975}, pages = {52--69}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-40921-0\_3}, doi = {10.1007/978-3-030-40921-0\_3}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/HiroseKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeYY19, author = {Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida}, title = {A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to {TPMS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2019}, url = {https://eprint.iacr.org/2019/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HiroseKY18, author = {Shoichi Hirose and Hidenori Kuwakado and Hirotaka Yoshida}, title = {A Pseudorandom-Function Mode Based on Lesamnta-LW and the {MDP} Domain Extension and Its Applications}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {1}, pages = {110--118}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.110}, doi = {10.1587/TRANSFUN.E101.A.110}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HiroseKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/KawanishiNSYH18, author = {Yasuyuki Kawanishi and Hideaki Nishihara and Daisuke Souma and Hirotaka Yoshida and Yoichi Hata}, title = {A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems}, booktitle = {2018 {IEEE} 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2018, Athens, Greece, August 12-15, 2018}, pages = {62--69}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00025}, doi = {10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00025}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/KawanishiNSYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/KawanishiNSY17, author = {Yasuyuki Kawanishi and Hideaki Nishihara and Daisuke Souma and Hirotaka Yoshida}, editor = {Stefano Tonetta and Erwin Schoitsch and Friedemann Bitsch}, title = {Detailed Analysis of Security Evaluation of Automotive Systems Based on {JASO} {TP15002}}, booktitle = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10489}, pages = {211--224}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66284-8\_18}, doi = {10.1007/978-3-319-66284-8\_18}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/safecomp/KawanishiNSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mhs/YoshidaHLYKK16, author = {Hirotaka Yoshida and Takeru Honda and Jongho Lee and Shiro Yano and Shinji Kakei and Toshiyuki Kondo}, title = {Development of a system for quantitative evaluation of motor function using Kinect v2 sensor}, booktitle = {International Symposium on Micro-NanoMechatronics and Human Science, {MHS} 2016, Nagoya, Japan, November 28-30, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/MHS.2016.7824230}, doi = {10.1109/MHS.2016.7824230}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/mhs/YoshidaHLYKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Yoshida13, author = {Hirotaka Yoshida}, title = {Design and Analysis of Cryptographic Hash Functions (Ontwerp en analyse van cryptografische hashfuncties)}, school = {Katholieke Universiteit Leuven, Belgium}, year = {2013}, url = {https://lirias.kuleuven.be/handle/123456789/375303}, timestamp = {Tue, 02 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Yoshida13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MikamiYWS13, author = {Shugo Mikami and Hirotaka Yoshida and Dai Watanabe and Kazuo Sakiyama}, title = {Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {3}, pages = {697--704}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.697}, doi = {10.1587/TRANSFUN.E96.A.697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MikamiYWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HiroseIKOPY12, author = {Shoichi Hirose and Kota Ideguchi and Hidenori Kuwakado and Toru Owada and Bart Preneel and Hirotaka Yoshida}, title = {An {AES} Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {89--99}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.89}, doi = {10.1587/TRANSFUN.E95.A.89}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HiroseIKOPY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PreneelYW11, author = {Bart Preneel and Hirotaka Yoshida and Dai Watanabe}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Finding Collisions for Reduced \emph{Luffa}-256 v2 (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {423--427}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_29}, doi = {10.1007/978-3-642-22497-3\_29}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PreneelYW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HiroseKY11, author = {Shoichi Hirose and Hidenori Kuwakado and Hirotaka Yoshida}, editor = {Howon Kim}, title = {Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {346--364}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_23}, doi = {10.1007/978-3-642-31912-9\_23}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/HiroseKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HiroseIKOPY10, author = {Shoichi Hirose and Kota Ideguchi and Hidenori Kuwakado and Toru Owada and Bart Preneel and Hirotaka Yoshida}, editor = {Kyung Hyune Rhee and DaeHun Nyang}, title = {A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW}, booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6829}, pages = {151--168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-24209-0\_10}, doi = {10.1007/978-3-642-24209-0\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HiroseIKOPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IdeguchiOY09, author = {Kota Ideguchi and Toru Owada and Hirotaka Yoshida}, title = {A Study on {RAM} Requirements of Various {SHA-3} Candidates on Low-cost 8-bit CPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2009}, url = {http://eprint.iacr.org/2009/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IdeguchiOY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YoshidaWOKWKP07, author = {Hirotaka Yoshida and Dai Watanabe and Katsuyuki Okeya and Jun Kitahara and Hongjun Wu and {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and Bart Preneel}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{MAME:} {A} Compression Function with Reduced Hardware Requirements}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {148--165}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_11}, doi = {10.1007/978-3-540-74735-2\_11}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/YoshidaWOKWKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06, author = {Florian Mendel and Bart Preneel and Vincent Rijmen and Hirotaka Yoshida and Dai Watanabe}, editor = {Rana Barua and Tanja Lange}, title = {Update on Tiger}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {63--79}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_6}, doi = {10.1007/11941378\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/YoshidaB05, author = {Hirotaka Yoshida and Alex Biryukov}, editor = {Bart Preneel and Stafford E. Tavares}, title = {Analysis of a {SHA-256} Variant}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {245--260}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_17}, doi = {10.1007/11693383\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/YoshidaB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WatanabeFYTP04, author = {Dai Watanabe and Soichi Furuya and Hirotaka Yoshida and Kazuo Takaragi and Bart Preneel}, title = {A New Keystream Generator {MUGI}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {37--45}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_37\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WatanabeFYTP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YoshidaBCLP04, author = {Hirotaka Yoshida and Alex Biryukov and Christophe De Canni{\`{e}}re and Joseph Lano and Bart Preneel}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Non-randomness of the Full 4 and 5-Pass {HAVAL}}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {324--336}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_23}, doi = {10.1007/978-3-540-30598-9\_23}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/YoshidaBCLP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WatanabeFYTP02, author = {Dai Watanabe and Soichi Furuya and Hirotaka Yoshida and Kazuo Takaragi and Bart Preneel}, editor = {Joan Daemen and Vincent Rijmen}, title = {A New Keystream Generator {MUGI}}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {179--194}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_14}, doi = {10.1007/3-540-45661-9\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/WatanabeFYTP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/FukuyamaY01, author = {Yoshikazu Fukuyama and Hirotaka Yoshida}, title = {A particle swarm optimization for reactive power and voltage control in electric power systems}, booktitle = {Proceedings of the 2001 Congress on Evolutionary Computation, {CEC} 2001, COEX, Seoul, Korea, May 27-30, 2001}, pages = {87--93}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/CEC.2001.934375}, doi = {10.1109/CEC.2001.934375}, timestamp = {Sat, 08 Jan 2022 01:38:02 +0100}, biburl = {https://dblp.org/rec/conf/cec/FukuyamaY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/FukuyamaTNY99, author = {Yoshikazu Fukuyama and Shinichi Takayama and Yosuke Nakanishi and Hirotaka Yoshida}, editor = {Wolfgang Banzhaf and Jason M. Daida and A. E. Eiben and Max H. Garzon and Vasant G. Honavar and Mark J. Jakiela and Robert E. Smith}, title = {A Particle Swarm Optimization for Reactive Power and Voltage Control in Electric Power Systems}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference {(GECCO} 1999), 13-17 July 1999, Orlando, Florida, {USA}}, pages = {1523--1528}, publisher = {Morgan Kaufmann}, year = {1999}, timestamp = {Wed, 22 Nov 2017 11:31:41 +0100}, biburl = {https://dblp.org/rec/conf/gecco/FukuyamaTNY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.