BibTeX records: Hirotaka Yoshida

download as .bib file

@article{DBLP:journals/access/KawanishiNYYI23,
  author       = {Yasuyuki Kawanishi and
                  Hideaki Nishihara and
                  Hirotaka Yoshida and
                  Hideki Yamamoto and
                  Hiroyuki Inoue},
  title        = {A Study on Threat Analysis and Risk Assessment Based on the "Asset
                  Container" Method and {CWSS}},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {18148--18156},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3246497},
  doi          = {10.1109/ACCESS.2023.3246497},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KawanishiNYYI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/KawanishiNYYI23,
  author       = {Yasuyuki Kawanishi and
                  Hideaki Nishihara and
                  Hideki Yamamoto and
                  Hirotaka Yoshida and
                  Hiroyuki Inoue},
  title        = {A Study of The Risk Quantification Method of Cyber-Physical Systems
                  focusing on Direct-Access Attacks to In-Vehicle Networks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {341--349},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0004},
  doi          = {10.1587/TRANSFUN.2022CIP0004},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/KawanishiNYYI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ShinOFIY22,
  author       = {SeongHan Shin and
                  Tomoyuki Ogawa and
                  Ryo Fujita and
                  Mari Itoh and
                  Hirotaka Yoshida},
  title        = {An Investigation of {PSA} Certified},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {97:1--97:8},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544452},
  doi          = {10.1145/3538969.3544452},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ShinOFIY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-06223,
  author       = {Hideaki Nishihara and
                  Yasuyuki Kawanishi and
                  Daisuke Souma and
                  Hirotaka Yoshida},
  title        = {On Validating Attack Trees with Attack Effects: An Approach from Barwise-Seligman's
                  Channel Theory},
  journal      = {CoRR},
  volume       = {abs/2204.06223},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.06223},
  doi          = {10.48550/ARXIV.2204.06223},
  eprinttype    = {arXiv},
  eprint       = {2204.06223},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-06223.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeYY22,
  author       = {Yuhei Watanabe and
                  Hideki Yamamoto and
                  Hirotaka Yoshida},
  title        = {Performance Evaluation of {NIST} {LWC} Finalists on {AVR} ATmega and
                  {ARM} Cortex-M3 Microcontrollers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1071},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1071},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/HiroseSY21,
  author       = {Shoichi Hirose and
                  Yu Sasaki and
                  Hirotaka Yoshida},
  title        = {Update on Analysis of Lesamnta-LW and New {PRF} Mode {LRF}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1304--1320},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020eap1109},
  doi          = {10.1587/TRANSFUN.2020EAP1109},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/HiroseSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/HiroseKY21,
  author       = {Shoichi Hirose and
                  Hidenori Kuwakado and
                  Hirotaka Yoshida},
  title        = {Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW
                  in the Ideal Cipher Model},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {104-D},
  number       = {11},
  pages        = {1894--1901},
  year         = {2021},
  url          = {https://doi.org/10.1587/transinf.2021ngp0008},
  doi          = {10.1587/TRANSINF.2021NGP0008},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/HiroseKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HellJMMY21,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Alexander Maximov and
                  Willi Meier and
                  Hirotaka Yoshida},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {24--41},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_2},
  doi          = {10.1007/978-3-030-92548-2\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/HellJMMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/KawanishiNYH21,
  author       = {Yasuyuki Kawanishi and
                  Hideaki Nishihara and
                  Hirotaka Yoshida and
                  Yoichi Hata},
  title        = {A Study of The Risk Quantification Method focusing on Direct-Access
                  Attacks in Cyber-Physical Systems},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  pages        = {298--305},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00059},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00059},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasc/KawanishiNYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HellJMMY21,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Alexander Maximov and
                  Willi Meier and
                  Hirotaka Yoshida},
  title        = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/751},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HellJMMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WatanabeYY20,
  author       = {Yuhei Watanabe and
                  Hideki Yamamoto and
                  Hirotaka Yoshida},
  title        = {Towards Minimizing {RAM} Requirement for Implementation of Grain-128a
                  on {ARM} Cortex-M3},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {2--10},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_2},
  doi          = {10.1587/TRANSFUN.2019CIP0025},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WatanabeYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WatanabeYY20,
  author       = {Yuhei Watanabe and
                  Hideki Yamamoto and
                  Hirotaka Yoshida},
  title        = {Lightweight Crypto Stack for {TPMS} Using Lesamnta-LW},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {5738215:1--5738215:12},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/5738215},
  doi          = {10.1155/2020/5738215},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WatanabeYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HiroseSY20,
  author       = {Shoichi Hirose and
                  Yu Sasaki and
                  Hirotaka Yoshida},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Lesamnta-LW Revisited: Improved Security Analysis of Primitive and
                  New {PRF} Mode},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {89--109},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_5},
  doi          = {10.1007/978-3-030-57808-4\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HiroseSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/NishiharaKSY20,
  author       = {Hideaki Nishihara and
                  Yasuyuki Kawanishi and
                  Daisuke Souma and
                  Hirotaka Yoshida},
  editor       = {Ant{\'{o}}nio Casimiro and
                  Frank Ortmeier and
                  Friedemann Bitsch and
                  Pedro Ferreira},
  title        = {On Validating Attack Trees with Attack Effects},
  booktitle    = {Computer Safety, Reliability, and Security - 39th International Conference,
                  {SAFECOMP} 2020, Lisbon, Portugal, September 16-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12234},
  pages        = {309--324},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54549-9\_21},
  doi          = {10.1007/978-3-030-54549-9\_21},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/NishiharaKSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KawanishiNSYH19,
  author       = {Yasuyuki Kawanishi and
                  Hideaki Nishihara and
                  Daisuke Souma and
                  Hirotaka Yoshida and
                  Yoichi Hata},
  title        = {A Comparative Study of {JASO} TP15002-Based Security Risk Assessment
                  Methods for Connected Vehicle System Design},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4614721:1--4614721:35},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4614721},
  doi          = {10.1155/2019/4614721},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KawanishiNSYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/Hell0MSY19,
  author       = {Martin Hell and
                  Thomas Johansson and
                  Willi Meier and
                  Jonathan S{\"{o}}nnerup and
                  Hirotaka Yoshida},
  editor       = {Claude Carlet and
                  Sylvain Guilley and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {An {AEAD} Variant of the Grain Stream Cipher},
  booktitle    = {Codes, Cryptology and Information Security - Third International Conference,
                  {C2SI} 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor
                  of Said El Hajji},
  series       = {Lecture Notes in Computer Science},
  volume       = {11445},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16458-4\_5},
  doi          = {10.1007/978-3-030-16458-4\_5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/c2si/Hell0MSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HiroseKY19,
  author       = {Shoichi Hirose and
                  Hidenori Kuwakado and
                  Hirotaka Yoshida},
  editor       = {Jae Hong Seo},
  title        = {Authenticated Encryption Based on Lesamnta-LW Hashing Mode},
  booktitle    = {Information Security and Cryptology - {ICISC} 2019 - 22nd International
                  Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11975},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-40921-0\_3},
  doi          = {10.1007/978-3-030-40921-0\_3},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/HiroseKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeYY19,
  author       = {Yuhei Watanabe and
                  Hideki Yamamoto and
                  Hirotaka Yoshida},
  title        = {A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function
                  to {TPMS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiroseKY18,
  author       = {Shoichi Hirose and
                  Hidenori Kuwakado and
                  Hirotaka Yoshida},
  title        = {A Pseudorandom-Function Mode Based on Lesamnta-LW and the {MDP} Domain
                  Extension and Its Applications},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {1},
  pages        = {110--118},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.110},
  doi          = {10.1587/TRANSFUN.E101.A.110},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiroseKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/KawanishiNSYH18,
  author       = {Yasuyuki Kawanishi and
                  Hideaki Nishihara and
                  Daisuke Souma and
                  Hirotaka Yoshida and
                  Yoichi Hata},
  title        = {A Study on Quantitative Risk Assessment Methods in Security Design
                  for Industrial Control Systems},
  booktitle    = {2018 {IEEE} 16th Intl Conf on Dependable, Autonomic and Secure Computing,
                  16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf
                  on Big Data Intelligence and Computing and Cyber Science and Technology
                  Congress, DASC/PiCom/DataCom/CyberSciTech 2018, Athens, Greece, August
                  12-15, 2018},
  pages        = {62--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DASC/PiCom/DataCom/CyberSciTec.2018.00025},
  doi          = {10.1109/DASC/PICOM/DATACOM/CYBERSCITEC.2018.00025},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/KawanishiNSYH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/KawanishiNSY17,
  author       = {Yasuyuki Kawanishi and
                  Hideaki Nishihara and
                  Daisuke Souma and
                  Hirotaka Yoshida},
  editor       = {Stefano Tonetta and
                  Erwin Schoitsch and
                  Friedemann Bitsch},
  title        = {Detailed Analysis of Security Evaluation of Automotive Systems Based
                  on {JASO} {TP15002}},
  booktitle    = {Computer Safety, Reliability, and Security - {SAFECOMP} 2017 Workshops,
                  ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September
                  12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10489},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66284-8\_18},
  doi          = {10.1007/978-3-319-66284-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/safecomp/KawanishiNSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mhs/YoshidaHLYKK16,
  author       = {Hirotaka Yoshida and
                  Takeru Honda and
                  Jongho Lee and
                  Shiro Yano and
                  Shinji Kakei and
                  Toshiyuki Kondo},
  title        = {Development of a system for quantitative evaluation of motor function
                  using Kinect v2 sensor},
  booktitle    = {International Symposium on Micro-NanoMechatronics and Human Science,
                  {MHS} 2016, Nagoya, Japan, November 28-30, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MHS.2016.7824230},
  doi          = {10.1109/MHS.2016.7824230},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/mhs/YoshidaHLYKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Yoshida13,
  author       = {Hirotaka Yoshida},
  title        = {Design and Analysis of Cryptographic Hash Functions (Ontwerp en analyse
                  van cryptografische hashfuncties)},
  school       = {Katholieke Universiteit Leuven, Belgium},
  year         = {2013},
  url          = {https://lirias.kuleuven.be/handle/123456789/375303},
  timestamp    = {Tue, 02 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Yoshida13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MikamiYWS13,
  author       = {Shugo Mikami and
                  Hirotaka Yoshida and
                  Dai Watanabe and
                  Kazuo Sakiyama},
  title        = {Correlation Power Analysis and Countermeasure on the Stream Cipher
                  Enocoro-128v2},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {3},
  pages        = {697--704},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.697},
  doi          = {10.1587/TRANSFUN.E96.A.697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MikamiYWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiroseIKOPY12,
  author       = {Shoichi Hirose and
                  Kota Ideguchi and
                  Hidenori Kuwakado and
                  Toru Owada and
                  Bart Preneel and
                  Hirotaka Yoshida},
  title        = {An {AES} Based 256-bit Hash Function for Lightweight Applications:
                  Lesamnta-LW},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {89--99},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.89},
  doi          = {10.1587/TRANSFUN.E95.A.89},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiroseIKOPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PreneelYW11,
  author       = {Bart Preneel and
                  Hirotaka Yoshida and
                  Dai Watanabe},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Finding Collisions for Reduced \emph{Luffa}-256 v2 (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {423--427},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_29},
  doi          = {10.1007/978-3-642-22497-3\_29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PreneelYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HiroseKY11,
  author       = {Shoichi Hirose and
                  Hidenori Kuwakado and
                  Hirotaka Yoshida},
  editor       = {Howon Kim},
  title        = {Compression Functions Using a Dedicated Blockcipher for Lightweight
                  Hashing},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {346--364},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_23},
  doi          = {10.1007/978-3-642-31912-9\_23},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/HiroseKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HiroseIKOPY10,
  author       = {Shoichi Hirose and
                  Kota Ideguchi and
                  Hidenori Kuwakado and
                  Toru Owada and
                  Bart Preneel and
                  Hirotaka Yoshida},
  editor       = {Kyung Hyune Rhee and
                  DaeHun Nyang},
  title        = {A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices:
                  Lesamnta-LW},
  booktitle    = {Information Security and Cryptology - {ICISC} 2010 - 13th International
                  Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6829},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-24209-0\_10},
  doi          = {10.1007/978-3-642-24209-0\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HiroseIKOPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IdeguchiOY09,
  author       = {Kota Ideguchi and
                  Toru Owada and
                  Hirotaka Yoshida},
  title        = {A Study on {RAM} Requirements of Various {SHA-3} Candidates on Low-cost
                  8-bit CPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IdeguchiOY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YoshidaWOKWKP07,
  author       = {Hirotaka Yoshida and
                  Dai Watanabe and
                  Katsuyuki Okeya and
                  Jun Kitahara and
                  Hongjun Wu and
                  {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and
                  Bart Preneel},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{MAME:} {A} Compression Function with Reduced Hardware Requirements},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {148--165},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_11},
  doi          = {10.1007/978-3-540-74735-2\_11},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/YoshidaWOKWKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06,
  author       = {Florian Mendel and
                  Bart Preneel and
                  Vincent Rijmen and
                  Hirotaka Yoshida and
                  Dai Watanabe},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Update on Tiger},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_6},
  doi          = {10.1007/11941378\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/YoshidaB05,
  author       = {Hirotaka Yoshida and
                  Alex Biryukov},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {Analysis of a {SHA-256} Variant},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {245--260},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_17},
  doi          = {10.1007/11693383\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/YoshidaB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WatanabeFYTP04,
  author       = {Dai Watanabe and
                  Soichi Furuya and
                  Hirotaka Yoshida and
                  Kazuo Takaragi and
                  Bart Preneel},
  title        = {A New Keystream Generator {MUGI}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {37--45},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_37\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WatanabeFYTP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YoshidaBCLP04,
  author       = {Hirotaka Yoshida and
                  Alex Biryukov and
                  Christophe De Canni{\`{e}}re and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Non-randomness of the Full 4 and 5-Pass {HAVAL}},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {324--336},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_23},
  doi          = {10.1007/978-3-540-30598-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YoshidaBCLP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WatanabeFYTP02,
  author       = {Dai Watanabe and
                  Soichi Furuya and
                  Hirotaka Yoshida and
                  Kazuo Takaragi and
                  Bart Preneel},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {A New Keystream Generator {MUGI}},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_14},
  doi          = {10.1007/3-540-45661-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WatanabeFYTP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/FukuyamaY01,
  author       = {Yoshikazu Fukuyama and
                  Hirotaka Yoshida},
  title        = {A particle swarm optimization for reactive power and voltage control
                  in electric power systems},
  booktitle    = {Proceedings of the 2001 Congress on Evolutionary Computation, {CEC}
                  2001, COEX, Seoul, Korea, May 27-30, 2001},
  pages        = {87--93},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/CEC.2001.934375},
  doi          = {10.1109/CEC.2001.934375},
  timestamp    = {Sat, 08 Jan 2022 01:38:02 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/FukuyamaY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/FukuyamaTNY99,
  author       = {Yoshikazu Fukuyama and
                  Shinichi Takayama and
                  Yosuke Nakanishi and
                  Hirotaka Yoshida},
  editor       = {Wolfgang Banzhaf and
                  Jason M. Daida and
                  A. E. Eiben and
                  Max H. Garzon and
                  Vasant G. Honavar and
                  Mark J. Jakiela and
                  Robert E. Smith},
  title        = {A Particle Swarm Optimization for Reactive Power and Voltage Control
                  in Electric Power Systems},
  booktitle    = {Proceedings of the Genetic and Evolutionary Computation Conference
                  {(GECCO} 1999), 13-17 July 1999, Orlando, Florida, {USA}},
  pages        = {1523--1528},
  publisher    = {Morgan Kaufmann},
  year         = {1999},
  timestamp    = {Wed, 22 Nov 2017 11:31:41 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/FukuyamaTNY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics