Nobuyuki Sugio

Orcid: 0000-0001-7313-1755

According to our database1, Nobuyuki Sugio authored at least 15 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Higher-order Differential Attack on Reduced-round SLIM.
J. Inf. Process., 2024

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming.
IET Inf. Secur., 2024

Implementation of Cryptanalytic Programs Using ChatGPT.
IACR Cryptol. ePrint Arch., 2024

Implementation for Malicious Software Using ChatGPT-4.
Proceedings of the Advances in Information and Computer Security, 2024

A Study on Forecasting Post-enrollment Grades of Students Using Gradient Boosting Decision Tree.
Proceedings of the Human Interface and the Management of Information, 2024

2023
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK.
IET Inf. Secur., 2023

2022
Integral Cryptanalysis on Reduced-Round KASUMI.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2022

2018
Integral Cryptanalysis of Reduced-round KASUMI.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2016
New Integral Characteristics of KASUMI Derived by Division Property.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Integral characteristics of MISTY2 derived by division property.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A Practical-time Attack on Reduced-round MISTY1.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2014
A new higher order differential of Camellia.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2007
A Study on Higher Order Differential Attack of KASUMI.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Security Analysis of MISTY1.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

2006
A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI.
Proceedings of the Applied Algebra, 2006


  Loading...