Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impossible differential attack on Simpira v2., , and . Sci. China Inf. Sci., 61 (3): 032106:1-032106:13 (2018)Quantum cryptanalysis on some generalized Feistel schemes., , and . Sci. China Inf. Sci., 62 (2): 22501:1-22501:12 (2019)Speech Recognition of English by Japanese Using Lexicon Represented by Multiple Reduced Phoneme Sets., and . IEICE Trans. Inf. Syst., 98-D (12): 2271-2279 (2015)Baseline wander correction in pulse waveforms using wavelet-based cascaded adaptive filter., , , , and . Comput. Biol. Medicine, 37 (5): 716-731 (2007)Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques., , , , and . Secur. Commun. Networks, (2018)Improved Cryptanalysis of the Block Cipher KASUMI., , , , and . Selected Areas in Cryptography, volume 7707 of Lecture Notes in Computer Science, page 222-233. Springer, (2012)Active Control of Configuration-Dependent Linkage Vibration with Application to a Planar Parallel Platform., and . ICRA, page 4327-4332. IEEE, (2005)Practical Attack on the Full MMB Block Cipher., , , and . Selected Areas in Cryptography, volume 7118 of Lecture Notes in Computer Science, page 185-199. Springer, (2011)Improved Single-Key Attacks on 9-Round AES-192/256., , and . FSE, volume 8540 of Lecture Notes in Computer Science, page 127-146. Springer, (2014)New Conditional Cube Attack on Keccak Keyed Modes., , , , , and . IACR Trans. Symmetric Cryptol., 2019 (2): 94-124 (2019)