Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsunoo, Yukiyasu
add a person with the name Tsunoo, Yukiyasu
 

Other publications of authors with the same name

Cryptanalysis of DES Implemented on Computers with Cache., , , , and . CHES, volume 2779 of Lecture Notes in Computer Science, page 62-76. Springer, (2003)Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext., , and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 369-382. Springer, (1994)Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (4): 799-807 (2010)Scheme overcoming incompatibility of privacy and utilization of personal data., , , , , , , and . ISITA, page 727-730. IEEE, (2012)Improving cache attacks by considering cipher structure., , , , and . Int. J. Inf. Sec., 5 (3): 166-176 (2006)A smaller and faster variant of RSM., , , and . DATE, page 1-6. European Design and Automation Association, (2014)Expanding Weak PRF with Small Key Size., and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 284-298. Springer, (2005)Correlation Power Analysis Based on Switching Glitch Model., , , and . WISA, volume 6513 of Lecture Notes in Computer Science, page 191-205. Springer, (2010)Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems., , , , , and . Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, page 201-212. Springer, (2013)Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations., and . FSE, volume 4047 of Lecture Notes in Computer Science, page 226-241. Springer, (2006)