Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DPA Countermeasures by Improving the Window Method., , , and . CHES, volume 2523 of Lecture Notes in Computer Science, page 303-317. Springer, (2002)Message Modification for Step 21-23 on SHA-0., , , , , and . IACR Cryptology ePrint Archive, (2006)ASRA-Q: AI Security Risk Assessment by Selective Questions., , , , , , and . J. Inf. Process., (2023)Anomaly Detection Method "Cumulative Sum Detection" for In-Vehicle Networks., , , and . J. Inf. Process., (2020)Collision-Based Power Attack for RSA with Small Public Exponent., , , and . IEICE Trans. Inf. Syst., 92-D (5): 897-908 (2009)Improved Collision Search for SHA-0., , , , , and . ASIACRYPT, volume 4284 of Lecture Notes in Computer Science, page 21-36. Springer, (2006)A strict evaluation method on the number of conditions for the SHA-1 collision search., , , , , , and . AsiaCCS, page 10-20. ACM, (2008)Compact Architecture for ASIC and FPGA Implementation of the KASUMI Block Cipher., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (12): 2628-2638 (2011)A Very Compact Hardware Implementation of the MISTY1 Block Cipher., , and . CHES, volume 5154 of Lecture Notes in Computer Science, page 315-330. Springer, (2008)The Block Cipher SC2000., , , , , , , and . FSE, volume 2355 of Lecture Notes in Computer Science, page 312-327. Springer, (2001)