default search action
Yuto Nakano
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Rikuto Kurahara, Kosei Sakamoto, Yuto Nakano, Takanori Isobe:
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2. ACISP (1) 2024: 77-97 - [c24]Shinnosuke Nozue, Yuto Nakano, Shoji Moriya, Tomoki Ariyama, Kazuma Kokuta, Suchun Xie, Kai Sato, Shusaku Sone, Ryohei Kamei, Reina Akama, Yuichiroh Matsubayashi, Keisuke Sakaguchi:
A Multimodal Dialogue System to Lead Consensus Building with Emotion-Displaying. SIGDIAL 2024: 669-673 - 2023
- [c23]Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi:
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation. ESORICS (1) 2023: 229-248 - 2022
- [j5]Chihiro Tomita, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, Masakatu Morii:
Extracting the Secrets of OpenSSL with RAMBleed. Sensors 22(9): 3586 (2022) - [i2]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). IACR Cryptol. ePrint Arch. 2022: 116 (2022) - 2021
- [j4]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G. IACR Trans. Symmetric Cryptol. 2021(2): 1-30 (2021) - [c22]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Automatic Security Inspection Framework for Trustworthy Supply Chain. SERA 2021: 45-50 - 2020
- [c21]Rei Ueno, Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma:
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes. COSADE 2020: 43-67 - [c20]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Consideration on Data Conformance Toward Building Trust in Supply Chain. EuCNC 2020: 128-132
2010 – 2019
- 2019
- [c19]Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. ICISSP 2019: 67-74 - [c18]Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. ICISSP (Revised Selected Papers) 2019: 74-92 - [c17]Anirban Basu, Theo Dimitrakos, Yuto Nakano, Shinsaku Kiyomoto:
A Framework for Blockchain-Based Verification of Integrity and Authenticity. IFIPTM 2019: 196-208 - [c16]Shinsaku Kiyomoto, Yuto Nakano, Atsushi Waseda, Toru Nakamura, Masahito Ishizaka, Yasuaki Kobayashi:
A Framework for Secure and Trustworthy Data Management in Supply Chain. MobiWIS 2019: 148-159 - 2018
- [c15]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c14]Seira Hidano, Yuto Nakano, Shinsaku Kiyomoto:
An Evaluation Framework for Fastest Oblivious RAM. IoTBDS 2018: 114-122 - 2016
- [c13]Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. Trustcom/BigDataSE/ISPA 2016: 201-207 - 2014
- [j3]Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - [j2]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 157-166 (2014) - [j1]Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation. IEICE Trans. Inf. Syst. 97-D(10): 2576-2585 (2014) - [c12]Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
Data Storage on the Cloud under User Control. CloudCom 2014: 739-742 - [c11]Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake:
Key Extraction Attack Using Statistical Analysis of Memory Dump Data. CRiSIS 2014: 239-246 - [c10]Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. SECRYPT 2014: 307-314 - [c9]Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake:
A Pre-processing Composition for Secret Key Recovery on Android Smartphone. WISTP 2014: 76-91 - 2013
- [c8]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. COSADE 2013: 169-183 - [c7]Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake:
LMM - A Common Component for Software License Management on Cloud. SECRYPT 2013: 284-295 - 2012
- [c6]Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake:
Memory Access Pattern Protection for Resource-Constrained Devices. CARDIS 2012: 188-202 - 2011
- [c5]Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto:
Analysis of Message Injection in Stream Cipher-Based Hash Functions. ACNS 2011: 498-513 - [c4]Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima:
MASHA - Low Cost Authentication with a New Stream Cipher. ISC 2011: 63-78 - 2010
- [c3]Ryu Watanabe, Yuto Nakano, Toshiaki Tanaka:
Single Sign-on Techniques with PKI-based Authentication for Mobile Phones. Security and Management 2010: 152-156 - [c2]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
Stream Cipher-Based Hash Function and Its Security. ICETE (Selected Papers) 2010: 188-202 - [c1]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
On a Construction of Stream-cipher-based Hash Functions. SECRYPT 2010: 334-343
2000 – 2009
- 2006
- [i1]Yuto Nakano, Hidenori Kuwakado, Masakatu Morii:
Redundancy of the Wang-Yu Sufficient Conditions. IACR Cryptol. ePrint Arch. 2006: 406 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint