Yukiyasu Tsunoo
According to our database1,
Yukiyasu Tsunoo
authored at least 32 papers
between 1994 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
1995
2000
2005
2010
2015
0
1
2
3
4
5
2
1
1
1
1
2
2
1
2
1
1
1
1
1
1
2
1
3
2
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Hardware-Trojans Rank: Quantitative Evaluation of Security Threats at Gate-Level Netlists by Pattern Matching.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
2015
A Hardware-Trojans Identifying Method Based on Trojan Net Scoring at Gate-Level Netlists.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
2007
IEEE Trans. Inf. Theory, 2007
IEEE Trans. Inf. Theory, 2007
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007
Proceedings of the Advances in Multimedia Information Processing, 2007
2006
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
IEEE Trans. Inf. Theory, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Information Security and Cryptology, 2005
2003
Syst. Comput. Jpn., 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
1994
Proceedings of the Advances in Cryptology, 1994