• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • 2010

    Image encryption design based on multi-dimensional matrix map and partitioning substitution and diffusion-integration substitution network structure

    Zhao, L., Xiao, D. & Sakurai, K., 7 15 2010, 2010 International Conference on Information Science and Applications, ICISA 2010. 5480269. (2010 International Conference on Information Science and Applications, ICISA 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Implementation and evaluation of bot detection scheme based on data transmission intervals

    Mizoguchi, S., Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 12 1 2010, 2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010. p. 73-78 6 p. 5634446. (2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Model-based intrusion detection by abstract interpretation

    Hua, J., Nishide, T. & Sakurai, K., 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Modeling and containment of search worms targeting web applications

    Hua, J. & Sakurai, K., 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6201 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Preserving integrity and confidentiality of a directed acyclic graph model of provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2010, Data and Applications Security and Privacy XXIV - 24th Annual IFIP WG 11.3 Working Conference, Proceedings. p. 311-318 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6166 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)
  • SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid

    Zhao, L., Ren, Y., Li, M. & Sakurai, K., 2010, Proceedings of the 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2010. 5470920

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Study of log file dispersion management method

    Etoh, F., Takahashi, K., Hori, Y. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 371-374 4 p. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Universally composable non-committing encryptions in the presence of adaptive adversaries

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 2010, SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography. p. 389-398 10 p. (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • 2011

    Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach

    Liao, X., Hao, D. & Sakurai, K., 2011, 17th Asia Pacific Conference on Communications, APCC 2011. p. 806-811 6 p. 6152918. (17th Asia-Pacific Conference on Communications, APCC 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • A game theory-based surveillance mechanism against suspicious insiders in MANETs (work-in-progress)

    Hao, D., Ren, Y. & Sakurai, K., 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 237-252 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • A generic evaluation method for key management schemes in wireless sensor network

    Na, R., Ren, Y., Hori, Y. & Sakurai, K., 5 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • An efficient key generation method in audio zero-watermarking

    Ciptasari, R. W., Fajar, A., Yulianto, F. A. & Sakurai, K., 12 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 336-339 4 p. 6079595

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • A new scrambling evaluation scheme based on spatial distribution entropy and centroid difference of bit-plane

    Zhao, L., Adhikari, A. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 29-44 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • A resource minimizing scheduling algorithm with ensuring the deadline and reliability in heterogeneous systems

    Zhao, L., Ren, Y. & Sakurai, K., 2011, Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011. p. 275-282 8 p. 5763377. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    15 被引用数 (Scopus)
  • A robust and compression-combined digital image encryption method based on compressive sensing

    Huang, R. & Sakurai, K., 12 19 2011, Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011. p. 105-108 4 p. 6079545. (Proceedings - 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    53 被引用数 (Scopus)
  • A security analysis of uniformly-layered rainbow: Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm

    Yasuda, T. & Sakurai, K., 12 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 275-294 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • A SMS-based mobile botnet using flooding algorithm

    Hua, J. & Sakurai, K., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication - 5th IFIP WG 11.2 International Workshop, WISTP 2011, Proceedings. p. 264-279 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6633 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    30 被引用数 (Scopus)
  • A study of communication route selection considering route security

    Etoh, F., Hori, Y. & Sakurai, K., 9 26 2011, Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011. p. 360-365 6 p. 6004186. (Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Classification on attacks in wireless ad hoc networks: A game theoretic view

    Liao, X., Hao, D. & Sakurai, K., 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    13 被引用数 (Scopus)
  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Customized program protection for a user customized data protection framework

    Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., 8 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of a forced encryption kernel module

    Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of document access control model based on role and security policy

    Mao, L., Yao, S., Zhang, K. & Sakurai, K., 11 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed Paillier cryptosystem without trusted dealer

    Nishide, T. & Sakurai, K., 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • General fault attacks on multivariate public key cryptosystems

    Hashimoto, Y., Takagi, T. & Sakurai, K., 12 12 2011, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Proceedings. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7071 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • Improvement on secrecy capacity of wireless LAN using matched filter

    Nishi, R., Morozov, K., Hori, Y. & Sakurai, K., 12 1 2011, Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011. p. 463-469 7 p. 6117466. (Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Integrity for the In-flight web page based on a fragile watermarking chain scheme

    Gao, P., Nishide, T., Hori, Y. & Sakurai, K., 5 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

    Ruan, N., Ren, Y., Hori, Y. & Sakurai, K., 12 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 1739-1744 6 p. 6121040. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Proactive blacklisting for malicious web sites by reputation evaluation based on domain and IP address registration

    Fukushima, Y., Hori, Y. & Sakurai, K., 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 352-361 10 p. 6120839. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    13 被引用数 (Scopus)
  • Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

    Zhao, F., Nishide, T. & Sakurai, K., 5 26 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    60 被引用数 (Scopus)
  • Realizing proxy re-encryption in the symmetric world

    Syalim, A., Nishide, T. & Sakurai, K., 2011, Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding. PART 1 ed. p. 259-274 16 p. (Communications in Computer and Information Science; vol. 251 CCIS, no. PART 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • Securing location-aware services based on online/offline signatures in VANETs

    Sur, C., Park, Y., Nishide, T., Sakurai, K. & Rhee, K. H., 2011, Availability, Reliability and Security for Business, Enterprise and Health Information Systems - IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Proceedings. p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6908 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited

    Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 656-661 6 p. 6132887. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Towards countermeasure of insider threat in network security

    Hori, Y., Nishide, T. & Sakurai, K., 2011, Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011. p. 634-636 3 p. 6132882. (Proceedings - 3rd IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Towards optimal revocation and tracing schemes - The power of the ternary tree

    Fukushima, K., Kiyomoto, S., Miyake, Y. & Sakurai, K., 9 12 2011, SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography. p. 37-49 13 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Traceback framework against botmaster by sharing network communication pattern information

    Mizoguchi, S., Takemori, K., Miyake, Y., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 639-644 6 p. 5976289. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • 2012

    A behavior-based detection method for outbreaks of low-rate attacks

    Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 267-272 6 p. 6305296

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 233-242 10 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

    Hao, D. & Sakurai, K., 5 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 495-502 8 p. 6184911. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    20 被引用数 (Scopus)
  • A method for embedding secret key information in RSA public key and its application

    Kitahara, M., Nishide, T. & Sakurai, K., 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 665-670 6 p. 6296934. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

    Su, C., Wang, G. & Sakurai, K., 11 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 1012-1017 6 p. 6296084. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • An image splicing detection based on interpolation analysis

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 12 27 2012, Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings. p. 390-401 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7674 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Application of scalar multiplication of edwards curves to pairing-based cryptography

    Yasuda, T., Takagi, T. & Sakurai, K., 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. Vol. 7631 LNCS. p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7631 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Barrier: A lightweight hypervisor for protecting kernel integrity via memory isolation

    Hua, J. & Sakurai, K., 2012, 27th Annual ACM Symposium on Applied Computing, SAC 2012. p. 1470-1477 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Collaborative behavior visualization and its detection by observing darknet traffic

    Akimoto, S., Hori, Y. & Sakurai, K., 12 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7672 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

    Nakamura, S., Hori, Y. & Sakurai, K., 5 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Cooperatively securing network coding against pollution attacks with incentive mechanism

    Xu, Y. & Sakurai, K., 5 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 11 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. Wu, C-K., Lin, D. & Yung, M. (eds.). Springer Verlag, p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Differential fault analysis of full lblock

    Zhao, L., Nishide, T. & Sakurai, K., 6 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7275 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)