Yuto Nakano
According to our database1,
Yuto Nakano
authored at least 32 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 25th Annual Meeting of the Special Interest Group on Discourse and Dialogue, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021
2020
Proceedings of the 2020 European Conference on Networks and Communications, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
2019
Proceedings of the Mobile Web and Intelligent Information Systems, 2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
2018
Proceedings of the 3rd International Conference on Internet of Things, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2014
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Single Sign-on Techniques with PKI-based Authentication for Mobile Phones.
Proceedings of the 2010 International Conference on Security & Management, 2010
2006