Остановите войну!
for scientists:
default search action
Toshiaki Tanaka
- > Home > Persons > Toshiaki Tanaka
Publications
- 2014
- [j34]Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - 2012
- [c42]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters. TrustCom 2012: 1755-1762 - 2011
- [c41]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
Privacy Frost: A User-Oriented Data Anonymization Tool. ARES 2011: 442-447 - 2010
- [j30]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Improved Subset Difference Method with Ternary Tree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2034-2044 (2010) - [c39]Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka:
Side-Channel Analysis of the K2 Stream Cipher. ACISP 2010: 53-73 - [c38]Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:
Security Verification for Authentication and Key Exchange Protocols, Revisited. AINA Workshops 2010: 226-233 - [c35]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework. Security and Management 2010: 323-329 - [c34]Shinsaku Kiyomoto, Toshiaki Tanaka:
A User-Oriented Anonymization Mechanism for Public Data. DPM/SETOP 2010: 22-35 - [c33]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
Stream Cipher-Based Hash Function and Its Security. ICETE (Selected Papers) 2010: 188-202 - [c32]Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi:
Efficient Implementation of Pairing on BREW Mobile Phones. IWSEC 2010: 326-336 - [c30]Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Small But Non-negligible Flaw in the Android Permission Scheme. POLICY 2010: 107-110 - [c29]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
On a Construction of Stream-cipher-based Hash Functions. SECRYPT 2010: 334-343 - [c28]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework. SocialCom/PASSAT 2010: 944-951 - 2009
- [j28]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
Design of Anonymous Attribute Authentication Mechanism. IEICE Trans. Commun. 92-B(4): 1112-1118 (2009) - [j27]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1808-1821 (2009) - [c27]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. CSE (2) 2009: 665-670 - [c24]Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 - 2008
- [j26]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 127-138 (2008) - [j25]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 316-329 (2008) - [j24]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. IEICE Trans. Inf. Syst. 91-D(5): 1330-1337 (2008) - [j23]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2365-2378 (2008) - [j22]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. J. Inf. Process. 16: 130-141 (2008) - [c22]Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka:
On-the-Fly Automatic Generation of Security Protocols. ICEIS (3-2) 2008: 97-104 - [c21]Shinsaku Kiyomoto, Toshiaki Tanaka:
Anonymous attribute authentication scheme using self-blindable certificates. ISI 2008: 215-217 - [c20]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ISC 2008: 455-470 - [c19]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
FPGA-Targeted Hardware Implementations of K2. SECRYPT 2008: 270-277 - [c18]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239 - [i4]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. IACR Cryptol. ePrint Arch. 2008: 409 (2008) - 2007
- [j20]Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta:
Universally Composable Hierarchical Hybrid Authenticated Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 139-151 (2007) - [j19]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1780-1787 (2007) - [j18]Shinsaku Kiyomoto, Toshiaki Tanaka, Yutaka Miyake, Yoshinori Mitamura:
Development of security functions for a medical information sharing platform. Syst. Comput. Jpn. 38(11): 49-63 (2007) - [c17]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2 Stream Cipher. ICETE (Selected Papers) 2007: 214-226 - [c16]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. SECRYPT 2007: 204-213 - [c13]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. WISA 2007: 203-214 - [i3]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones using BREW. IACR Cryptol. ePrint Arch. 2007: 340 (2007) - 2006
- [j17]Shinsaku Kiyomoto, Toshiaki Tanaka:
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 222-226 (2006) - [c12]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. MDM 2006: 17 - 2005
- [j14]Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 287-295 (2005) - [j13]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2778-2791 (2005) - 2004
- [j12]Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao:
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 182-189 (2004) - [j11]Masahiro Kuroda, Mariko Yoshida, Ryoji Ono, Shinsaku Kiyomoto, Toshiaki Tanaka:
Secure Service and Network Framework for Mobile Ethernet. Wirel. Pers. Commun. 29(3-4): 161-190 (2004)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-01-15 01:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint