Teruo Saito

According to our database1, Teruo Saito authored at least 14 papers between 2003 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Finding Higher Order Differentials of MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
A Single-Key Attack on 6-Round KASUMI.
IACR Cryptol. ePrint Arch., 2011

2010
Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Higher Order Differential Attack on 6-Round MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Results of Linear Cryptanalysis Using Linear Sieve Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
Higher Order Differential Attacks on Reduced-Round MISTY1.
Proceedings of the Information Security and Cryptology, 2008

Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Impossible Differential Cryptanalysis of CLEFIA.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2007
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher.
IEEE Trans. Inf. Theory, 2007

A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher.
IEEE Trans. Inf. Theory, 2007

Distinguishing Attack Against TPypy.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2005
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Trans. Inf. Theory, 2005

2003
Cryptanalysis of DES Implemented on Computers with Cache.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003


  Loading...