Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Fake QR Codes Using Information from Error-Correction., , , , , , , , , and 2 other author(s). J. Inf. Process., (2021)Generalized Classes of Weak Keys on RC4 Using Predictive State., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 10-18 (2011)Full Plaintext Recovery Attacks on RC4 Using Multiple Biases., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 81-91 (2015)Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations., , , and . Comput. J., 62 (4): 614-630 (2019)FMS Attack-Resistant WEP Implementation Is Still Broken., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 17-26. Springer, (2005)Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers., , and . CANDAR Workshops, page 333-338. IEEE, (2019)A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2., , , , and . IACR Cryptology ePrint Archive, (2008)Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack., , and . J. Inf. Process., 21 (4): 599-606 (2013)Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace.. J. Inf. Process., (2023)A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers., , , , , and . J. Inf. Process., (2023)