Hirotaka Yoshida
Title
Cited by
Cited by
Year
A new keystream generator MUGI
D Watanabe, S Furuya, H Yoshida, K Takaragi, B Preneel
International Workshop on Fast Software Encryption, 179-194, 2002
1152002
A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW
S Hirose, K Ideguchi, H Kuwakado, T Owada, B Preneel, H Yoshida
International Conference on Information Security and Cryptology, 151-168, 2010
512010
MAME: A compression function with reduced hardware requirements
H Yoshida, D Watanabe, K Okeya, J Kitahara, H Wu, Ö Küçük, B Preneel
International Workshop on Cryptographic Hardware and Embedded Systems, 148-165, 2007
462007
Analysis of a SHA-256 variant
H Yoshida, A Biryukov
International Workshop on Selected Areas in Cryptography, 245-260, 2005
452005
SHA-3 proposal: Lesamnta
S Hirose
http://csrc. nist. gov/groups/ST/hash/sha-3/Round1/documents/Lesamnta. zip, 2008
242008
Non-randomness of the full 4 and 5-pass HAVAL
H Yoshida, A Biryukov, C De Canniere, J Lano, B Preneel
International Conference on Security in Communication Networks, 324-336, 2004
242004
Update on tiger
F Mendel, B Preneel, V Rijmen, H Yoshida, D Watanabe
International Conference on Cryptology in India, 63-79, 2006
212006
An AES based 256-bit hash function for lightweight applications: Lesamnta-LW
S Hirose, K Ideguchi, H Kuwakado, T Owada, B Preneel, H Yoshida
IEICE transactions on fundamentals of electronics, communications and …, 2012
162012
Grain-128AEADv2-A lightweight AEAD stream cipher
M Hell, T Johansson, A Maximov, F Willi Meier, SJ Sönnerup, H Yoshida
152019
Message-authenticated encryption apparatus or decryption apparatus for common-key cipher
H Yoshida, S Furuya
US Patent App. 10/786,160, 2004
152004
Detailed analysis of security evaluation of automotive systems based on JASO TP15002
Y Kawanishi, H Nishihara, D Souma, H Yoshida
International Conference on Computer Safety, Reliability, and Security, 211-224, 2017
102017
A new keystream generator MUGI
D Watanabe, S Furuya, H Yoshida, K Takaragi, B Preneel
IEICE transactions on fundamentals of electronics, communications and …, 2004
92004
A comparative study of JASO TP15002-based security risk assessment methods for connected vehicle system design
Y Kawanishi, H Nishihara, D Souma, H Yoshida, Y Hata
Security and Communication Networks 2019, 2019
72019
Security analysis of the compression function of Lesamnta and its impact
S Hirose, H Kuwakado, H Yoshida
http://csrc. nist. gov/groups/ST/hash/sha-3/Round1/documents …, 2009
72009
A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs.
K Ideguchi, T Owada, H Yoshida
IACR Cryptol. ePrint Arch. 2009, 260, 2009
72009
A new keystream generator MUGI, Fast Software Encryption
D Watanabe, S Furuya, H Yoshida, K Takaragi, B Preneel
9th International Workshop, FSE, 4-6, 2002
72002
An AEAD variant of the grain stream cipher
M Hell, T Johansson, W Meier, J Sönnerup, H Yoshida
International Conference on Codes, Cryptology, and Information Security, 55-71, 2019
52019
A pseudorandom-function mode based on Lesamnta-LW and the MDP domain extension and its applications
S Hirose, H Kuwakado, H Yoshida
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
52018
Pseudorandom number generator and encryption device using the same
D Watanabe, H Yoshida
US Patent 8,122,075, 2012
52012
Compression functions using a dedicated blockcipher for lightweight hashing
S Hirose, H Kuwakado, H Yoshida
International Conference on Information Security and Cryptology, 346-364, 2011
52011
The system can't perform the operation now. Try again later.
Articles 1–20