default search action
Toshinobu Kaneko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i2]Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko:
Higher Order Differential Attack against Full-Round BIG. IACR Cryptol. ePrint Arch. 2020: 551 (2020)
2010 – 2019
- 2019
- [c48]Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko:
A New Higher Order Differential of BIG. CANDAR Workshops 2019: 381-386 - 2018
- [c47]Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko:
A New Higher Order Differential of FeW. CANDAR Workshops 2018: 466-471 - [c46]Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko:
Integral Cryptanalysis of Reduced-round KASUMI. ISITA 2018: 447-451 - 2017
- [c45]Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko:
The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher. AINA 2017: 925-930 - 2016
- [c44]Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi:
A Practical-time Attack on Reduced-round MISTY1. ICISSP 2016: 235-242 - [c43]Naoki Shibayama, Toshinobu Kaneko:
A new higher order differential of DBlock. ISITA 2016: 146-150 - [c42]Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko:
Integral characteristics of MISTY2 derived by division property. ISITA 2016: 151-155 - [c41]Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi:
New Integral Characteristics of KASUMI Derived by Division Property. WISA 2016: 267-279 - 2014
- [j14]Naoki Shibayama, Toshinobu Kaneko:
A New Higher Order Differential of CLEFIA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 118-126 (2014) - [c40]Kenichi Yamaya, Toshinobu Kaneko:
Differential probability for a component in non-linear function of K2 v2.0. ISITA 2014: 153-157 - [c39]Nobuyuki Sugio, Hiroshi Aono, Kimihiko Sekino, Toshinobu Kaneko:
A new higher order differential of Camellia. ISITA 2014: 478-482 - [c38]Naoki Shibayama, Toshinobu Kaneko:
A new higher order differential of LBlock. ISITA 2014: 488-492 - 2012
- [j13]Yasutaka Igarashi, Toshinobu Kaneko:
Some Saturation Characteristics of XOR Sum of Balance Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 2-7 (2012) - [c37]Naoki Shibayama, Toshinobu Kaneko:
A peculiar higher order differential of CLEFIA. ISITA 2012: 526-530 - 2010
- [c36]Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko:
Higher Order Differential Attack on Step-Reduced Variants of Luffa v1. FSE 2010: 270-285 - [c35]Dai Watanabe, Toru Owada, Kazuto Okamoto, Yasutaka Igarashi, Toshinobu Kaneko:
Update on Enocoro stream cipher. ISITA 2010: 778-783 - [c34]Yasutaka Igarashi, Toshinobu Kaneko:
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher. ISITA 2010: 784-788 - [c33]Yasutaka Igarashi, Toshinobu Kaneko:
On the Strength Evaluation of Lesamnta against Differential Cryptanalysis. ICSI (2) 2010: 157-166
2000 – 2009
- 2009
- [j12]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko:
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2438-2446 (2009) - [c32]Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko:
A Study on Multi-Resipient Encryptions for Selective Disclosure. Security and Management 2009: 570-575 - [c31]Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko:
A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques. MASS 2009: 714-721 - [i1]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko:
Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method. IACR Cryptol. ePrint Arch. 2009: 61 (2009) - 2008
- [j11]Yuki Tsuchiya, Tomoaki Ohtsuki, Toshinobu Kaneko:
Scheduling Algorithm with Power Allocation for Random Unitary Beamforming. IEICE Trans. Commun. 91-B(1): 232-238 (2008) - [j10]Kenichi Kobayashi, Tomoaki Ohtsuki, Toshinobu Kaneko:
MIMO Systems in the Presence of Feedback Delay. IEICE Trans. Commun. 91-B(3): 829-836 (2008) - [j9]Satoshi Gounai, Tomoaki Ohtsuki, Toshinobu Kaneko:
Mapping for Iterative MMSE-SIC with Belief Propagation. IEICE Trans. Commun. 91-B(7): 2187-2197 (2008) - [c30]Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko:
Enocoro-80: A Hardware Oriented Stream Cipher. ARES 2008: 1294-1300 - [c29]Yasuo Hatano, Kunihiko Miyazaki, Toshinobu Kaneko:
Cryptographic Approch for Workflow Systems. II3E 2008: 75-86 - 2007
- [j8]Nobuyuki Sugio, Hiroshi Aono, Sadayuki Hongo, Toshinobu Kaneko:
A Study on Higher Order Differential Attack of KASUMI. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 14-21 (2007) - [j7]Satoshi Gounai, Tomoaki Ohtsuki, Toshinobu Kaneko:
Lowering the Error Floors of Irregular LDPC Code on Fast Fading Environment with Perfect and Imperfect CSIs. IEICE Trans. Commun. 90-B(3): 569-577 (2007) - [j6]Toshinobu Kaneko:
Special Section on Information Theory and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1727-1728 (2007) - [j5]Kenji Hamano, Toshinobu Kaneko:
Correction of Overlapping Template Matching Test Included in NIST Randomness Test Suite. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1788-1792 (2007) - [c28]Kenichi Kobayashi, Tomoaki Ohtsuki, Toshinobu Kaneko:
Precoding for MIMO Systems in Line-Of-Sight (LOS) Environment. GLOBECOM 2007: 4370-4374 - [c27]Kenichi Kobayashi, Tomoaki Ohtsuki, Toshinobu Kaneko:
Throughput Maximization Transmission Control Scheme Using Precoding for MIMO Systems. ICC 2007: 5098-5102 - [c26]Yuki Tsuchiya, Tomoaki Ohtsuki, Toshinobu Kaneko:
Random Beamforming Using Low Feedback and Low Latency Power Allocation. VTC Fall 2007: 402-406 - [c25]Yuki Tsuchiya, Tomoaki Ohtsuki, Toshinobu Kaneko:
Scheduling Algorithm with Power Allocation for Random Unitary Beamforming. VTC Spring 2007: 1668-1672 - [c24]Yoshitaka Eriguchi, Tomoaki Ohtsuki, Toshinobu Kaneko:
Low Computational Complexity 2-Dimensional Pilot-Symbol-Assisted (2-D PSA) MMSE Channel Estimation with Extended Estimation Size for MIMO-OFDM Systems. WCNC 2007: 181-185 - [c23]Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko:
Security Analysis of MISTY1. WISA 2007: 215-226 - 2006
- [c22]Nobuyuki Sugio, Shunichi Nambu, Toshinobu Kaneko:
A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI. AAECC 2006: 163-172 - [c21]Takahiro Fujita, Tomoaki Ohtsuki, Toshinobu Kaneko:
Estimation Method of False Alarm Probability and Observation Noise Variance in Wireless Sensor Networks. FUSION 2006: 1-6 - [c20]Satoshi Gounai, Tomoaki Ohtsuki, Toshinobu Kaneko:
Performance of Concatenated Code with LDPC Code and RSC Code. ICC 2006: 1195-1199 - [c19]Kenichi Kobayashi, Tomoaki Ohtsuki, Toshinobu Kaneko:
MIMO Systems in the Presence of Feedback Delay. ICC 2006: 4102-4106 - [c18]Kenichi Kobayashi, Tomoaki Ohtsuki, Toshinobu Kaneko:
MMSE Precoder with Mode Selection for MIMO Systems. VTC Fall 2006: 1-5 - [c17]Junichi Shirahama, Tomoaki Ohtsuki, Toshinobu Kaneko:
Method of Reducing Search Area for Localization in Sensor Networks. VTC Spring 2006: 354-357 - [c16]Satoshi Gounai, Tomoaki Ohtsuki, Toshinobu Kaneko:
Modified Belief Propagation Decoding Algorithm for Low-Density Parity Check Code Based on Oscillation. VTC Spring 2006: 1467-1471 - 2005
- [j4]Hiroki Sekine, Tetsuro Nosaka, Yasuo Hatano, Masaki Takeda, Toshinobu Kaneko:
A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 16-24 (2005) - [j3]Dai Watanabe, Soichi Furuya, Toshinobu Kaneko:
A MAC Forgery Attack on SOBER-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(5): 1166-1172 (2005) - [c15]Junichi Shirahama, Tomoaki Ohtsuki, Toshinobu Kaneko:
Low complexity source localization algorithms in sensor networks. PE-WASUN 2005: 130-136 - 2004
- [j2]Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko:
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 18-27 (2004) - 2003
- [j1]Takeshi Kawabata, Masaki Takeda, Toshinobu Kaneko:
A Study on Higher Order Differential Attack of Camellia. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 31-36 (2003) - [c14]Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko:
An Optimized Algebraic Method for Higher Order Differential Attack. AAECC 2003: 61-70 - 2002
- [c13]Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko:
Higher Order Differential Attack of Camellia (II). Selected Areas in Cryptography 2002: 129-146 - 2000
- [c12]Tomoaki Ohtsuki, Toshinobu Kaneko, Joseph M. Kahn:
Performance analysis of linear binary block coded optical PPM CDMA systems with soft-decision decoding. GLOBECOM 2000: 1196-1200 - [c11]Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko:
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. ICISC 2000: 14-21 - [c10]Haruki Seki, Toshinobu Kaneko:
Differential Cryptanalysis of Reduced Rounds of GOST. Selected Areas in Cryptography 2000: 315-323
1990 – 1999
- 1999
- [c9]Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko:
Strenght of MISTY1 without FL Function for Higher Order Differential Attack. AAECC 1999: 221-230 - [c8]Haruki Seki, Toshinobu Kaneko:
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials. ASIACRYPT 1999: 43-51 - [c7]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Interpolation Attacks of the Block Cipher: SNAKE. FSE 1999: 275-289 - 1998
- [c6]Takeshi Shimoyama, Toshinobu Kaneko:
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. CRYPTO 1998: 200-211 - [c5]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attak of CAST Cipher. FSE 1998: 17-31 - [c4]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attack Using Chosen Higher Order Differences. Selected Areas in Cryptography 1998: 106-117 - 1997
- [c3]Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko:
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. ISW 1997: 32-42 - [c2]Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko:
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. ISW 1997: 43-54 - 1991
- [c1]Toshinobu Kaneko:
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. ASIACRYPT 1991: 485-488
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint