Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yuto Nakano
@inproceedings{DBLP:conf/esorics/AnandBCFIKLNST23, author = {Ravi Anand and Subhadeep Banik and Andrea Caforio and Kazuhide Fukushima and Takanori Isobe and Shinsaku Kiyomoto and Fukang Liu and Yuto Nakano and Kosei Sakamoto and Nobuyuki Takeuchi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {229--248}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_12}, doi = {10.1007/978-3-031-50594-2\_12}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AnandBCFIKLNST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TomitaTFNSM22, author = {Chihiro Tomita and Makoto Takita and Kazuhide Fukushima and Yuto Nakano and Yoshiaki Shiraishi and Masakatu Morii}, title = {Extracting the Secrets of OpenSSL with RAMBleed}, journal = {Sensors}, volume = {22}, number = {9}, pages = {3586}, year = {2022}, url = {https://doi.org/10.3390/s22093586}, doi = {10.3390/S22093586}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/TomitaTFNSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakamotoLNKI22, author = {Kosei Sakamoto and Fukang Liu and Yuto Nakano and Shinsaku Kiyomoto and Takanori Isobe}, title = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2022}, url = {https://eprint.iacr.org/2022/116}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SakamotoLNKI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SakamotoLNKI21, author = {Kosei Sakamoto and Fukang Liu and Yuto Nakano and Shinsaku Kiyomoto and Takanori Isobe}, title = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {1--30}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.1-30}, doi = {10.46586/TOSC.V2021.I2.1-30}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SakamotoLNKI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/NakanoNKOIHYMK21, author = {Yuto Nakano and Toru Nakamura and Yasuaki Kobayashi and Takashi Ozu and Masahito Ishizaka and Masayuki Hashimoto and Hiroyuki Yokoyama and Yutaka Miyake and Shinsaku Kiyomoto}, title = {Automatic Security Inspection Framework for Trustworthy Supply Chain}, booktitle = {19th {IEEE/ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2021, Kanazawa, Japan, June 20-22, 2021}, pages = {45--50}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SERA51205.2021.9509040}, doi = {10.1109/SERA51205.2021.9509040}, timestamp = {Fri, 13 Aug 2021 10:40:52 +0200}, biburl = {https://dblp.org/rec/conf/sera/NakanoNKOIHYMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/UenoFNKH20, author = {Rei Ueno and Kazuhide Fukushima and Yuto Nakano and Shinsaku Kiyomoto and Naofumi Homma}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Single-Trace Side-Channel Analysis on Polynomial-Based {MAC} Schemes}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {43--67}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_3}, doi = {10.1007/978-3-030-68773-1\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/UenoFNKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/NakanoNKIHYMK20, author = {Yuto Nakano and Toru Nakamura and Yasuaki Kobayashi and Masahito Ishizaka and Masayuki Hashimoto and Hiroyuki Yokoyama and Yutaka Miyake and Shinsaku Kiyomoto}, title = {Consideration on Data Conformance Toward Building Trust in Supply Chain}, booktitle = {2020 European Conference on Networks and Communications, EuCNC 2020, Dubrovnik, Croatia, June 15-18, 2020}, pages = {128--132}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuCNC48522.2020.9200933}, doi = {10.1109/EUCNC48522.2020.9200933}, timestamp = {Tue, 29 Sep 2020 14:45:05 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/NakanoNKIHYMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {67--74}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259500670074}, doi = {10.5220/0007259500670074}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {74--92}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_4}, doi = {10.1007/978-3-030-49443-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/BasuDNK19, author = {Anirban Basu and Theo Dimitrakos and Yuto Nakano and Shinsaku Kiyomoto}, editor = {Weizhi Meng and Piotr Cofta and Christian Damsgaard Jensen and Tyrone Grandison}, title = {A Framework for Blockchain-Based Verification of Integrity and Authenticity}, booktitle = {Trust Management {XIII} - 13th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {563}, pages = {196--208}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33716-2\_15}, doi = {10.1007/978-3-030-33716-2\_15}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BasuDNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiwis/KiyomotoNWNIK19, author = {Shinsaku Kiyomoto and Yuto Nakano and Atsushi Waseda and Toru Nakamura and Masahito Ishizaka and Yasuaki Kobayashi}, editor = {Irfan Awan and Muhammad Younas and Perin {\"{U}}nal and Markus Aleksy}, title = {A Framework for Secure and Trustworthy Data Management in Supply Chain}, booktitle = {Mobile Web and Intelligent Information Systems - 16th International Conference, MobiWIS 2019, Istanbul, Turkey, August 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11673}, pages = {148--159}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27192-3\_12}, doi = {10.1007/978-3-030-27192-3\_12}, timestamp = {Sun, 25 Oct 2020 22:57:17 +0100}, biburl = {https://dblp.org/rec/conf/mobiwis/KiyomotoNWNIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/NakanoHKS18, author = {Yuto Nakano and Seira Hidano and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {Active Attack Against Oblivious {RAM}}, booktitle = {32nd {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018}, pages = {744--751}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AINA.2018.00112}, doi = {10.1109/AINA.2018.00112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/NakanoHKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/HidanoNK18, author = {Seira Hidano and Yuto Nakano and Shinsaku Kiyomoto}, editor = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Gary B. Wills and Robert John Walters and Farshad Firouzi and Victor Chang}, title = {An Evaluation Framework for Fastest Oblivious {RAM}}, booktitle = {Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, IoTBDS 2018, Funchal, Madeira, Portugal, March 19-21, 2018}, pages = {114--122}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006690701140122}, doi = {10.5220/0006690701140122}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/HidanoNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16, author = {Kazuhide Fukushima and Youssef Souissi and Seira Hidano and Robert Nguyen and Jean{-}Luc Danger and Sylvain Guilley and Yuto Nakano and Shinsaku Kiyomoto and Laurent Sauvage}, title = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {201--207}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0064}, doi = {10.1109/TRUSTCOM.2016.0064}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanoFKIMTS14, author = {Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsukasa Ishiguro and Yutaka Miyake and Toshiaki Tanaka and Kouichi Sakurai}, title = {Fast Implementation of KCipher-2 for Software and Hardware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {1}, pages = {43--52}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.43}, doi = {10.1587/TRANSINF.E97.D.43}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HibikiHNFKMA14, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {157--166}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.157}, doi = {10.1587/TRANSFUN.E97.A.157}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanoKMS14, author = {Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, title = {Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {10}, pages = {2576--2585}, year = {2014}, url = {https://doi.org/10.1587/transinf.2013THP0007}, doi = {10.1587/TRANSINF.2013THP0007}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoKMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/CorenaBNKM14, author = {Juan Camilo Corena and Anirban Basu and Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Data Storage on the Cloud under User Control}, booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014}, pages = {739--742}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CloudCom.2014.113}, doi = {10.1109/CLOUDCOM.2014.113}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/CorenaBNKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/NakanoBKM14, author = {Yuto Nakano and Anirban Basu and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Javier L{\'{o}}pez and Indrajit Ray and Bruno Crispo}, title = {Key Extraction Attack Using Statistical Analysis of Memory Dump Data}, booktitle = {Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8924}, pages = {239--246}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17127-2\_17}, doi = {10.1007/978-3-319-17127-2\_17}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/NakanoBKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14, author = {Juan Camilo Corena and Anirban Basu and Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {307--314}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005049803070314}, doi = {10.5220/0005049803070314}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14, author = {Yuto Nakano and Youssef Souissi and Robert Nguyen and Laurent Sauvage and Jean{-}Luc Danger and Sylvain Guilley and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {David Naccache and Damien Sauveron}, title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_6}, doi = {10.1007/978-3-662-43826-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HibikiHNFKMA13, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, editor = {Emmanuel Prouff}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {169--183}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_11}, doi = {10.1007/978-3-642-40026-1\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13, author = {Shinsaku Kiyomoto and Andre Rein and Yuto Nakano and Carsten Rudolph and Yutaka Miyake}, editor = {Pierangela Samarati}, title = {{LMM} - {A} Common Component for Software License Management on Cloud}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {284--295}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223177/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/NakanoCKM12, author = {Yuto Nakano and Carlos Cid and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Stefan Mangard}, title = {Memory Access Pattern Protection for Resource-Constrained Devices}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {188--202}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_13}, doi = {10.1007/978-3-642-37288-9\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/NakanoCKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NakanoCFK11, author = {Yuto Nakano and Carlos Cid and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Analysis of Message Injection in Stream Cipher-Based Hash Functions}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {498--513}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_29}, doi = {10.1007/978-3-642-21554-4\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NakanoCFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiyomotoHYNF11, author = {Shinsaku Kiyomoto and Matthew Henricksen and Wun{-}She Yap and Yuto Nakano and Kazuhide Fukushima}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {{MASHA} - Low Cost Authentication with a New Stream Cipher}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {63--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_5}, doi = {10.1007/978-3-642-24861-0\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiyomotoHYNF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WatanabeNT10, author = {Ryu Watanabe and Yuto Nakano and Toshiaki Tanaka}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Single Sign-on Techniques with PKI-based Authentication for Mobile Phones}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {152--156}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WatanabeNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/NakanoKKT10, author = {Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Stream Cipher-Based Hash Function and Its Security}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {188--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_12}, doi = {10.1007/978-3-642-25206-8\_12}, timestamp = {Sat, 19 Oct 2019 20:35:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/NakanoKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NakanoKKT10, author = {Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {On a Construction of Stream-cipher-based Hash Functions}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {334--343}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NakanoKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakanoKM06, author = {Yuto Nakano and Hidenori Kuwakado and Masakatu Morii}, title = {Redundancy of the Wang-Yu Sufficient Conditions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2006}, url = {http://eprint.iacr.org/2006/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakanoKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.