Hidema TANAKA


Improvements on Security Evaluation of AES against Differential Bias Attack
Haruhisa KOSUGE Hidema TANAKA 
Publication:   
Publication Date: 2017/11/01
Vol. E100-A  No. 11  pp. 2398-2407
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherside-channel attackformal security analysisleakage modelAESdifferential bias attackkey enumerationrank estimation
 Summary | Full Text:PDF(620.4KB)

Analysis of Side-Channel Attack Based on Information Theory
Hiroaki MIZUNO Keisuke IWAI Hidema TANAKA Takakazu KUROKAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/07/01
Vol. E97-A  No. 7  pp. 1523-1532
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
side-channel-attackcorrelation power analysisamount of informationEnocoro-128 v2
 Summary | Full Text:PDF(1.3MB)

Throughput and Power Efficiency Evaluation of Block Ciphers on Kepler and GCN GPUs Using Micro-Benchmark Analysis
Naoki NISHIKAWA Keisuke IWAI Hidema TANAKA Takakazu KUROKAWA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/06/01
Vol. E97-D  No. 6  pp. 1506-1515
Type of Manuscript:  PAPER
Category: Fundamentals of Information Systems
Keyword: 
throughputpower efficiencyGPUOpenCLAESCamelliaSC2000KeplerGraphics Core Next
 Summary | Full Text:PDF(2MB)

Changes to Quantum Cryptography
Yasuyuki SAKAI Hidema TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/05/01
Vol. E93-A  No. 5  pp. 872-879
Type of Manuscript:  INVITED PAPER (Special Section on Leading-Edge Developments in Quantum Cryptographic Systems)
Category: 
Keyword: 
modern cryptographyquantum key distributionunconditional security
 Summary | Full Text:PDF(346.6KB)

Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest
Hidema TANAKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1439-1446
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Information Leakage
Keyword: 
electromagnetic emanationEMCTempesteavesdroppingside-channel attack
 Summary | Full Text:PDF(284.2KB)

Classification of Hash Functions Suitable for Real-Life Systems
Yasumasa HIRAI Takashi KUROKAWA Shin'ichiro MATSUO Hidema TANAKA Akihiro YAMAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 64-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
securityhash function
 Summary | Full Text:PDF(290.5KB)

Linearization Method and Linear Complexity
Hidema TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 22-29
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
pseudo-random number generatorlinear complexityalgebraic cryptanalysislinearization methodstream cipher
 Summary | Full Text:PDF(167KB)

Optimization for the Algebraic Method and Its Application to an Attack of MISTY1
Yasuo HATANO Hidema TANAKA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 18-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
MISTY1higher order differential attackalgebraic methodlinear dependencyprobabilistic attack equation
 Summary | Full Text:PDF(458.6KB)