What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hidema Tanaka
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/iciss
Protecting Ownership of Trained DNN Models with Zero-Knowledge Proofs.
Shungo Sato
Hidema Tanaka
2022
conf/wisa
A Novel Metric for Password Security Risk Against Dictionary Attacks.
Binh Le Thanh Thai
Hidema Tanaka
2021
conf/iciss
Experimental Verification of Estimated Block Size of BKZ Algorithm Against LWE.
Amane Takeshige
Haruhisa Kosuge
Hidema Tanaka
2021
conf/sacrypt
Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS^{MT}}$.
Haruhisa Kosuge
Hidema Tanaka
2020
conf/iciss
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information.
Hidema Tanaka
Keisuke Fukushima
2019
conf/asiajcis
Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo.
Hiroki Sato
Mamoru Mimura
Hidema Tanaka
2018
conf/icics
A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs.
Mamoru Mimura
Hidema Tanaka
2017
conf/latincrypt
Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration.
Haruhisa Kosuge
Hidema Tanaka
2017
conf/asiajcis
A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs.
Mamoru Mimura
Yuhei Otsubo
Hidehiko Tanaka
Hidema Tanaka
2017
conf/icisc
Reading Network Packets as a Natural Language for Intrusion Detection.
Mamoru Mimura
Hidema Tanaka
2017
conf/iciss
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network.
Son Duc Nguyen
Mamoru Mimura
Hidema Tanaka
2017
conf/iciss
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector.
Mamoru Mimura
Hidema Tanaka
2017
conf/iciss
Dark Domain Name Attack: A New Threat to Domain Name System.
Bold Munkhbaatar
Mamoru Mimura
Hidema Tanaka
2017
conf/wisa
Abusing TCP Retransmission for DoS Attack Inside Virtual Network.
Son Duc Nguyen
Mamoru Mimura
Hidema Tanaka
2017
conf/africacrypt
Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration.
Haruhisa Kosuge
Hidema Tanaka
2016
conf/iciss
Network Counter-Attack Strategy by Topology Map Analysis.
Hidema Tanaka
2016
conf/wisa
Algebraic Degree Estimation for Integral Attack by Randomized Algorithm.
Haruhisa Kosuge
Hidema Tanaka
2015
conf/iciss
Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher.
Haruhisa Kosuge
Keisuke Iwai
Hidema Tanaka
Takakazu Kurokawa
2013
conf/iciss
Information Theoretical Analysis of Side-Channel Attack.
Hiroaki Mizuno
Keisuke Iwai
Hidema Tanaka
Takakazu Kurokawa
2007
conf/iciss
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.
Hidema Tanaka
2007
conf/wisa
Security Analysis of MISTY1.
Hidema Tanaka
Yasuo Hatano
Nobuyuki Sugio
Toshinobu Kaneko
2004
conf/wisa
Evaluation and Improvement of the Tempest Fonts.
Hidema Tanaka
Osamu Takizawa
Akihiro Yamamura
2001
conf/fse
The Block Cipher SC2000.
Takeshi Shimoyama
Hitoshi Yanami
Kazuhiro Yokoyama
Masahiko Takenaka
Kouichi Itoh
Jun Yajima
Naoya Torii
Hidema Tanaka
2000
conf/icisc
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack.
Hidema Tanaka
Chikashi Ishii
Toshinobu Kaneko
Coauthors
Akihiro Yamamura
(1)
Amane Takeshige
(1)
Binh Le Thanh Thai
(1)
Bold Munkhbaatar
(1)
Chikashi Ishii
(1)
Haruhisa Kosuge
(6)
Hidehiko Tanaka
(1)
Hidema Tanaka
(24)
Hiroaki Mizuno
(1)
Hiroki Sato
(1)
Hitoshi Yanami
(1)
Jun Yajima
(1)
Kazuhiro Yokoyama
(1)
Keisuke Fukushima
(1)
Keisuke Iwai
(2)
Kouichi Itoh
(1)
Mamoru Mimura
(8)
Masahiko Takenaka
(1)
Naoya Torii
(1)
Nobuyuki Sugio
(1)
Osamu Takizawa
(1)
Shungo Sato
(1)
Son Duc Nguyen
(2)
Takakazu Kurokawa
(2)
Takeshi Shimoyama
(1)
Toshinobu Kaneko
(2)
Yasuo Hatano
(1)
Yuhei Otsubo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to