Author of the publication

Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV.

, , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (4): 799-807 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossible Differential Cryptanalysis of CLEFIA., , , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 398-411. Springer, (2008)A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher., , , and . IEEE Trans. Inf. Theory, 53 (9): 3250-3255 (2007)Results of Linear Cryptanalysis Using Linear Sieve Methods., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (5): 1347-1355 (2009)Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (3): 278-288 (2022)WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher., , , , , , , , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 535-564. Springer, (2020)Parallel Verification of Serial MAC and AE Modes., , , , and . SAC, volume 13203 of Lecture Notes in Computer Science, page 200-219. Springer, (2021)Improving cache attacks by considering cipher structure., , , , and . Int. J. Inf. Sec., 5 (3): 166-176 (2006)Security of Related-Key Differential Attacks on TWINE, Revisited., , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 212-214 (2020)Shorter bit sequence is enough to break stream cipher LILI-128., , , , and . IEEE Trans. Inf. Theory, 51 (12): 4312-4319 (2005)Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher., , , and . IEEE Trans. Inf. Theory, 53 (11): 4377-4383 (2007)