Yukiyasu TSUNOO


Hardware-Trojans Rank: Quantitative Evaluation of Security Threats at Gate-Level Netlists by Pattern Matching
Masaru OYA Noritaka YAMASHITA Toshihiko OKAMURA Yukiyasu TSUNOO Masao YANAGISAWA Nozomu TOGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/12/01
Vol. E99-A  No. 12  pp. 2335-2347
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: 
Keyword: 
hardware Trojansgate-level netlista quantitative criterionpattern matchingdesign phase
 Summary | Full Text:PDF(1.8MB)

FOREWORD
Yukiyasu TSUNOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 1-2
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(266.7KB)

A Hardware-Trojans Identifying Method Based on Trojan Net Scoring at Gate-Level Netlists
Masaru OYA Youhua SHI Noritaka YAMASHITA Toshihiko OKAMURA Yukiyasu TSUNOO Satoshi GOTO Masao YANAGISAWA Nozomu TOGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2537-2546
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Logic Synthesis, Test and Verification
Keyword: 
hardware Trojansgolden-IC freeclassificationidentificationgate-level netlist
 Summary | Full Text:PDF(2.3MB)

Correlated Noise Reduction for Electromagnetic Analysis
Hongying LIU Xin JIN Yukiyasu TSUNOO Satoshi GOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 185-195
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
electromagnetic analysis (EMA)power analysiselectromagnetic leakagecorrelated noisesingular value decomposition
 Summary | Full Text:PDF(2.9MB)

Finding Higher Order Differentials of MISTY1
Yukiyasu TSUNOO Teruo SAITO Takeshi KAWABATA Hirokatsu NAKAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/06/01
Vol. E95-A  No. 6  pp. 1049-1055
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherCRYPTREChigher order differential attackMISTY1NESSIE
 Summary | Full Text:PDF(519.3KB)

Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
Yukiyasu TSUNOO Takeshi KAWABATA Tomoyasu SUZAKI Hiroyasu KUBO Teruo SAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A  No. 4  pp. 799-807
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
eSTREAMstream cipherDICINGcache attacks
 Summary | Full Text:PDF(338.6KB)

Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
Yukiyasu TSUNOO Teruo SAITO Maki SHIGERI Takeshi KAWABATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 144-152
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
block cipherCRYPTREChigher order differential attackMISTY1NESSIE
 Summary | Full Text:PDF(322.6KB)

Results of Linear Cryptanalysis Using Linear Sieve Methods
Yukiyasu TSUNOO Hiroki NAKASHIMA Hiroyasu KUBO Teruo SAITO Takeshi KAWABATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5  pp. 1347-1355
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherlinear cryptanalysislinear sieve method
 Summary | Full Text:PDF(355KB)

Higher Order Differential Attack on 6-Round MISTY1
Yukiyasu TSUNOO Teruo SAITO Hiroki NAKASHIMA Maki SHIGERI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 3-10
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block cipherCRYPTREChigher order differential attackMISTY1NESSIE
 Summary | Full Text:PDF(305.2KB)

An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
Yibo FAN Jidong WANG Takeshi IKENAGA Yukiyasu TSUNOO Satoshi GOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 12-21
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
Unequal Secure Encryptionvideo encryptionselective encryptionH.264/AVCAESLEX
 Summary | Full Text:PDF(2.2MB)