BibTeX records: Yuto Nakano

download as .bib file

@inproceedings{DBLP:conf/esorics/AnandBCFIKLNST23,
  author       = {Ravi Anand and
                  Subhadeep Banik and
                  Andrea Caforio and
                  Kazuhide Fukushima and
                  Takanori Isobe and
                  Shinsaku Kiyomoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Kosei Sakamoto and
                  Nobuyuki Takeuchi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {An Ultra-High Throughput AES-Based Authenticated Encryption Scheme
                  for 6G: Design and Implementation},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {229--248},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_12},
  doi          = {10.1007/978-3-031-50594-2\_12},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AnandBCFIKLNST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TomitaTFNSM22,
  author       = {Chihiro Tomita and
                  Makoto Takita and
                  Kazuhide Fukushima and
                  Yuto Nakano and
                  Yoshiaki Shiraishi and
                  Masakatu Morii},
  title        = {Extracting the Secrets of OpenSSL with RAMBleed},
  journal      = {Sensors},
  volume       = {22},
  number       = {9},
  pages        = {3586},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22093586},
  doi          = {10.3390/S22093586},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/TomitaTFNSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakamotoLNKI22,
  author       = {Kosei Sakamoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Takanori Isobe},
  title        = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full
                  version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/116},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SakamotoLNKI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SakamotoLNKI21,
  author       = {Kosei Sakamoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Takanori Isobe},
  title        = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {1--30},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.1-30},
  doi          = {10.46586/TOSC.V2021.I2.1-30},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SakamotoLNKI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/NakanoNKOIHYMK21,
  author       = {Yuto Nakano and
                  Toru Nakamura and
                  Yasuaki Kobayashi and
                  Takashi Ozu and
                  Masahito Ishizaka and
                  Masayuki Hashimoto and
                  Hiroyuki Yokoyama and
                  Yutaka Miyake and
                  Shinsaku Kiyomoto},
  title        = {Automatic Security Inspection Framework for Trustworthy Supply Chain},
  booktitle    = {19th {IEEE/ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2021, Kanazawa, Japan,
                  June 20-22, 2021},
  pages        = {45--50},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SERA51205.2021.9509040},
  doi          = {10.1109/SERA51205.2021.9509040},
  timestamp    = {Fri, 13 Aug 2021 10:40:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/NakanoNKOIHYMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/UenoFNKH20,
  author       = {Rei Ueno and
                  Kazuhide Fukushima and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Naofumi Homma},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Single-Trace Side-Channel Analysis on Polynomial-Based {MAC} Schemes},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {43--67},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_3},
  doi          = {10.1007/978-3-030-68773-1\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/UenoFNKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/NakanoNKIHYMK20,
  author       = {Yuto Nakano and
                  Toru Nakamura and
                  Yasuaki Kobayashi and
                  Masahito Ishizaka and
                  Masayuki Hashimoto and
                  Hiroyuki Yokoyama and
                  Yutaka Miyake and
                  Shinsaku Kiyomoto},
  title        = {Consideration on Data Conformance Toward Building Trust in Supply
                  Chain},
  booktitle    = {2020 European Conference on Networks and Communications, EuCNC 2020,
                  Dubrovnik, Croatia, June 15-18, 2020},
  pages        = {128--132},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuCNC48522.2020.9200933},
  doi          = {10.1109/EUCNC48522.2020.9200933},
  timestamp    = {Tue, 29 Sep 2020 14:45:05 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/NakanoNKIHYMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {67--74},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259500670074},
  doi          = {10.5220/0007259500670074},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_4},
  doi          = {10.1007/978-3-030-49443-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BasuDNK19,
  author       = {Anirban Basu and
                  Theo Dimitrakos and
                  Yuto Nakano and
                  Shinsaku Kiyomoto},
  editor       = {Weizhi Meng and
                  Piotr Cofta and
                  Christian Damsgaard Jensen and
                  Tyrone Grandison},
  title        = {A Framework for Blockchain-Based Verification of Integrity and Authenticity},
  booktitle    = {Trust Management {XIII} - 13th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {563},
  pages        = {196--208},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33716-2\_15},
  doi          = {10.1007/978-3-030-33716-2\_15},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/BasuDNK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiwis/KiyomotoNWNIK19,
  author       = {Shinsaku Kiyomoto and
                  Yuto Nakano and
                  Atsushi Waseda and
                  Toru Nakamura and
                  Masahito Ishizaka and
                  Yasuaki Kobayashi},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Perin {\"{U}}nal and
                  Markus Aleksy},
  title        = {A Framework for Secure and Trustworthy Data Management in Supply Chain},
  booktitle    = {Mobile Web and Intelligent Information Systems - 16th International
                  Conference, MobiWIS 2019, Istanbul, Turkey, August 26-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11673},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27192-3\_12},
  doi          = {10.1007/978-3-030-27192-3\_12},
  timestamp    = {Sun, 25 Oct 2020 22:57:17 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiwis/KiyomotoNWNIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/NakanoHKS18,
  author       = {Yuto Nakano and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {Active Attack Against Oblivious {RAM}},
  booktitle    = {32nd {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018},
  pages        = {744--751},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AINA.2018.00112},
  doi          = {10.1109/AINA.2018.00112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/NakanoHKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/HidanoNK18,
  author       = {Seira Hidano and
                  Yuto Nakano and
                  Shinsaku Kiyomoto},
  editor       = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Gary B. Wills and
                  Robert John Walters and
                  Farshad Firouzi and
                  Victor Chang},
  title        = {An Evaluation Framework for Fastest Oblivious {RAM}},
  booktitle    = {Proceedings of the 3rd International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2018, Funchal, Madeira, Portugal, March
                  19-21, 2018},
  pages        = {114--122},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006690701140122},
  doi          = {10.5220/0006690701140122},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/HidanoNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16,
  author       = {Kazuhide Fukushima and
                  Youssef Souissi and
                  Seira Hidano and
                  Robert Nguyen and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Laurent Sauvage},
  title        = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes:
                  The Final Piece of All-in-One Assessment Methodology},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0064},
  doi          = {10.1109/TRUSTCOM.2016.0064},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoFKIMTS14,
  author       = {Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsukasa Ishiguro and
                  Yutaka Miyake and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Fast Implementation of KCipher-2 for Software and Hardware},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {1},
  pages        = {43--52},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.E97.D.43},
  doi          = {10.1587/TRANSINF.E97.D.43},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HibikiHNFKMA14,
  author       = {Takafumi Hibiki and
                  Naofumi Homma and
                  Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Takafumi Aoki},
  title        = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based
                  Countermeasure},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {157--166},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.157},
  doi          = {10.1587/TRANSFUN.E97.A.157},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoKMS14,
  author       = {Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Kouichi Sakurai},
  title        = {Comparison of Access Pattern Protection Schemes and Proposals for
                  Efficient Implementation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {10},
  pages        = {2576--2585},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.2013THP0007},
  doi          = {10.1587/TRANSINF.2013THP0007},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanoKMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/CorenaBNKM14,
  author       = {Juan Camilo Corena and
                  Anirban Basu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {Data Storage on the Cloud under User Control},
  booktitle    = {{IEEE} 6th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2014, Singapore, December 15-18, 2014},
  pages        = {739--742},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CloudCom.2014.113},
  doi          = {10.1109/CLOUDCOM.2014.113},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/CorenaBNKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/NakanoBKM14,
  author       = {Yuto Nakano and
                  Anirban Basu and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Javier L{\'{o}}pez and
                  Indrajit Ray and
                  Bruno Crispo},
  title        = {Key Extraction Attack Using Statistical Analysis of Memory Dump Data},
  booktitle    = {Risks and Security of Internet and Systems - 9th International Conference,
                  CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8924},
  pages        = {239--246},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17127-2\_17},
  doi          = {10.1007/978-3-319-17127-2\_17},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/NakanoBKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14,
  author       = {Juan Camilo Corena and
                  Anirban Basu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Multiple-server Efficient Reusable Proof of Data Possesion from
                  Private Information Retrieval Techniques},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {307--314},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005049803070314},
  doi          = {10.5220/0005049803070314},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14,
  author       = {Yuto Nakano and
                  Youssef Souissi and
                  Robert Nguyen and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_6},
  doi          = {10.1007/978-3-662-43826-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HibikiHNFKMA13,
  author       = {Takafumi Hibiki and
                  Naofumi Homma and
                  Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Takafumi Aoki},
  editor       = {Emmanuel Prouff},
  title        = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_11},
  doi          = {10.1007/978-3-642-40026-1\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13,
  author       = {Shinsaku Kiyomoto and
                  Andre Rein and
                  Yuto Nakano and
                  Carsten Rudolph and
                  Yutaka Miyake},
  editor       = {Pierangela Samarati},
  title        = {{LMM} - {A} Common Component for Software License Management on Cloud},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {284--295},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223177/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/NakanoCKM12,
  author       = {Yuto Nakano and
                  Carlos Cid and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Stefan Mangard},
  title        = {Memory Access Pattern Protection for Resource-Constrained Devices},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_13},
  doi          = {10.1007/978-3-642-37288-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/NakanoCKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NakanoCFK11,
  author       = {Yuto Nakano and
                  Carlos Cid and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Analysis of Message Injection in Stream Cipher-Based Hash Functions},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {498--513},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_29},
  doi          = {10.1007/978-3-642-21554-4\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NakanoCFK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiyomotoHYNF11,
  author       = {Shinsaku Kiyomoto and
                  Matthew Henricksen and
                  Wun{-}She Yap and
                  Yuto Nakano and
                  Kazuhide Fukushima},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {{MASHA} - Low Cost Authentication with a New Stream Cipher},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_5},
  doi          = {10.1007/978-3-642-24861-0\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiyomotoHYNF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WatanabeNT10,
  author       = {Ryu Watanabe and
                  Yuto Nakano and
                  Toshiaki Tanaka},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {Single Sign-on Techniques with PKI-based Authentication for Mobile
                  Phones},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {152--156},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WatanabeNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/NakanoKKT10,
  author       = {Yuto Nakano and
                  Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Stream Cipher-Based Hash Function and Its Security},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_12},
  doi          = {10.1007/978-3-642-25206-8\_12},
  timestamp    = {Sat, 19 Oct 2019 20:35:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/NakanoKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NakanoKKT10,
  author       = {Yuto Nakano and
                  Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {On a Construction of Stream-cipher-based Hash Functions},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {334--343},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NakanoKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakanoKM06,
  author       = {Yuto Nakano and
                  Hidenori Kuwakado and
                  Masakatu Morii},
  title        = {Redundancy of the Wang-Yu Sufficient Conditions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakanoKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics