Login / Signup
Teruo Saito
Publication Activity (10 Years)
Years Active: 2003-2012
Publications (10 Years): 0
Top Topics
Search Algorithm
Linear Combination
Natural Images
High Order
Top Venues
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
</>
Publications
</>
Yukiyasu Tsunoo
,
Teruo Saito
,
Takeshi Kawabata
,
Hirokatsu Nakagawa
Finding Higher Order Differentials of MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(6) (2012)
Teruo Saito
A Single-Key Attack on 6-Round KASUMI.
IACR Cryptol. ePrint Arch.
2011 (2011)
Yukiyasu Tsunoo
,
Teruo Saito
,
Maki Shigeri
,
Takeshi Kawabata
Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2010)
Yukiyasu Tsunoo
,
Takeshi Kawabata
,
Tomoyasu Suzaki
,
Hiroyasu Kubo
,
Teruo Saito
Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(4) (2010)
Yukiyasu Tsunoo
,
Teruo Saito
,
Hiroki Nakashima
,
Maki Shigeri
Higher Order Differential Attack on 6-Round MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2009)
Yukiyasu Tsunoo
,
Hiroki Nakashima
,
Hiroyasu Kubo
,
Teruo Saito
,
Takeshi Kawabata
Results of Linear Cryptanalysis Using Linear Sieve Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(5) (2009)
Yukiyasu Tsunoo
,
Teruo Saito
,
Hiroyasu Kubo
,
Tomoyasu Suzaki
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
ICICS
(2008)
Yukiyasu Tsunoo
,
Teruo Saito
,
Maki Shigeri
,
Takeshi Kawabata
Higher Order Differential Attacks on Reduced-Round MISTY1.
ICISC
(2008)
Yukiyasu Tsunoo
,
Etsuko Tsujihara
,
Maki Shigeri
,
Teruo Saito
,
Tomoyasu Suzaki
,
Hiroyasu Kubo
Impossible Differential Cryptanalysis of CLEFIA.
FSE
(2008)
Yukiyasu Tsunoo
,
Teruo Saito
,
Hiroyasu Kubo
,
Tomoyasu Suzaki
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher.
IEEE Trans. Inf. Theory
53 (11) (2007)
Yukiyasu Tsunoo
,
Teruo Saito
,
Hiroyasu Kubo
,
Tomoyasu Suzaki
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher.
IEEE Trans. Inf. Theory
53 (9) (2007)
Yukiyasu Tsunoo
,
Teruo Saito
,
Takeshi Kawabata
,
Hiroki Nakashima
Distinguishing Attack Against TPypy.
Selected Areas in Cryptography
(2007)
Yukiyasu Tsunoo
,
Teruo Saito
,
Maki Shigeri
,
Hiroyasu Kubo
,
Kazuhiko Minematsu
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Trans. Inf. Theory
51 (12) (2005)
Yukiyasu Tsunoo
,
Teruo Saito
,
Tomoyasu Suzaki
,
Maki Shigeri
,
Hiroshi Miyauchi
Cryptanalysis of DES Implemented on Computers with Cache.
CHES
(2003)