default search action
Hidema Tanaka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Binh Le Thanh Thai, Hidema Tanaka:
A Study on Markov-Based Password Strength Meters. IEEE Access 12: 69066-69075 (2024) - [j15]Binh Le Thanh Thai, Hidema Tanaka:
A statistical Markov-based password strength meter. Internet Things 25: 101057 (2024) - [j14]Naoya Sekiguchi, Hidema Tanaka:
BGP hijack attack policy against AS topology map. Internet Things 25: 101059 (2024) - 2022
- [j13]Binh Le Thanh Thai, Hidema Tanaka, Kohtaro Watanabe:
Improved scheme and evaluation method for progressive visual cryptography. EURASIP J. Inf. Secur. 2022(1): 9 (2022) - [j12]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Leverage Slow-port-exhaustion Attacks by Exploiting Abnormal Connections from IoT Devices and Docker Containers. J. Inf. Process. 30: 486-494 (2022) - 2021
- [j11]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
SPEChecker: Checking the feasibility of Slow-port-exhaustion attack on various hypervisors. Internet Things 15: 100421 (2021) - [j10]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
SVTester: Finding DoS Vulnerabilities of Virtual Switches. J. Inf. Process. 29: 581-591 (2021) - 2018
- [j9]Mamoru Mimura, Hidema Tanaka:
Leaving All Proxy Server Logs to Paragraph Vector. J. Inf. Process. 26: 804-812 (2018) - 2017
- [j8]Haruhisa Kosuge, Hidema Tanaka:
Improvements on Security Evaluation of AES against Differential Bias Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(11): 2398-2407 (2017) - 2014
- [j7]Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Throughput and Power Efficiency Evaluation of Block Ciphers on Kepler and GCN GPUs Using Micro-Benchmark Analysis. IEICE Trans. Inf. Syst. 97-D(6): 1506-1515 (2014) - [j6]Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Analysis of Side-Channel Attack Based on Information Theory. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(7): 1523-1532 (2014) - 2010
- [j5]Yasuyuki Sakai, Hidema Tanaka:
Changes to Quantum Cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(5): 872-879 (2010) - 2008
- [j4]Hidema Tanaka:
Linearization Method and Linear Complexity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 22-29 (2008) - [j3]Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Matsuo, Hidema Tanaka, Akihiro Yamamura:
Classification of Hash Functions Suitable for Real-Life Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 64-73 (2008) - [j2]Hidema Tanaka:
Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest. IEICE Trans. Inf. Syst. 91-D(5): 1439-1446 (2008) - 2004
- [j1]Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko:
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 18-27 (2004)
Conference and Workshop Papers
- 2023
- [c49]Binh Le Thanh Thai, Hidema Tanaka:
A Study for Security of Visual Cryptography. C2SI 2023: 261-277 - [c48]Tomohiro Sekiguchi, Hidema Tanaka:
Security Enhancement Method Using Shortened Error Correcting Codes. C2SI 2023: 379-394 - 2022
- [c47]Naoya Sekiguchi, Hidema Tanaka:
A Study of Network Attack Strategy Using AS Topology Map. BWCCA 2022: 91-101 - [c46]Binh Le Thanh Thai, Hidema Tanaka:
An analysis of password security risk against dictionary attacks. ISITA 2022: 229-233 - [c45]Binh Le Thanh Thai, Hidema Tanaka:
A Novel Metric for Password Security Risk Against Dictionary Attacks. WISA 2022: 291-302 - 2021
- [c44]Amane Takeshige, Haruhisa Kosuge, Hidema Tanaka:
Experimental Verification of Estimated Block Size of BKZ Algorithm Against LWE. ICISS 2021: 173-184 - [c43]Haruhisa Kosuge, Hidema Tanaka:
Simple and Memory-Efficient Signature Generation of $\mathrm {XMSS^{MT}}$. SAC 2021: 377-397 - 2020
- [c42]Hidema Tanaka, Keisuke Fukushima:
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. ICISS 2020: 221-240 - 2019
- [c41]Hiroki Sato, Mamoru Mimura, Hidema Tanaka:
Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo. AsiaJCIS 2019: 48-55 - [c40]Son Nguyen Duc, Mamoru Mimura, Hidema Tanaka:
An Analysis of TCP ACK Storm DoS Attack on Virtual Network. ISCIT 2019: 288-293 - 2018
- [c39]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Slow-Port-Exhaustion DoS Attack on Virtual Network Using Port Address Translation. CANDAR 2018: 126-132 - [c38]Junta Imai, Mamoru Mimura, Hidema Tanaka:
Verifiable Secret Sharing Scheme Using Hash Values. CANDAR Workshops 2018: 405-409 - [c37]Hiroya Miura, Mamoru Mimura, Hidema Tanaka:
Discovering New Malware Families Using a Linguistic-Based Macros Detection Method. CANDAR Workshops 2018: 431-437 - [c36]Mamoru Mimura, Hidema Tanaka:
A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs. ICICS 2018: 708-718 - [c35]Hiroya Miura, Mamoru Mimura, Hidema Tanaka:
Macros Finder: Do You Remember LOVELETTER? ISPEC 2018: 3-18 - 2017
- [c34]Haruhisa Kosuge, Hidema Tanaka:
Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration. AFRICACRYPT 2017: 95-113 - [c33]Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka, Hidema Tanaka:
A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs. AsiaJCIS 2017: 31-37 - [c32]Mamoru Mimura, Yuhei Otsubo, Hidema Tanaka, Atsuhiro Goto:
Is Emulating "Binary Grep in Eyes" Possible with Machine Learning? CANDAR 2017: 337-343 - [c31]Mamoru Mimura, Hidema Tanaka:
Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec. CANDAR 2017: 456-462 - [c30]Shunsuke Tayama, Hidema Tanaka:
Analysis of Effectiveness of Slow Read DoS Attack and Influence of Communication Environment. CANDAR 2017: 510-515 - [c29]Mamoru Mimura, Hidema Tanaka:
Reading Network Packets as a Natural Language for Intrusion Detection. ICISC 2017: 339-350 - [c28]Mamoru Mimura, Hidema Tanaka:
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. ICISS 2017: 146-163 - [c27]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. ICISS 2017: 367-386 - [c26]Bold Munkhbaatar, Mamoru Mimura, Hidema Tanaka:
Dark Domain Name Attack: A New Threat to Domain Name System. ICISS 2017: 405-414 - [c25]Haruhisa Kosuge, Hidema Tanaka:
Theoretical Security Evaluation Against Side-Channel Cube Attack with Key Enumeration. LATINCRYPT 2017: 145-165 - [c24]Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Abusing TCP Retransmission for DoS Attack Inside Virtual Network. WISA 2017: 199-211 - 2016
- [c23]Hidema Tanaka:
Network Counter-Attack Strategy by Topology Map Analysis. ICISS 2016: 243-262 - [c22]Haruhisa Kosuge, Hidema Tanaka:
Algebraic Degree Estimation for Integral Attack by Randomized Algorithm. WISA 2016: 292-304 - 2015
- [c21]Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa:
Integral Attack on Reduced-Round Rectangle. CSCloud 2015: 68-73 - [c20]Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai, Takakazu Kurokawa:
Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU. CSCloud 2015: 439-444 - [c19]Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Improved GPU Implementation of RainbowCrack. CANDAR 2015: 616-618 - [c18]Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher. ICISS 2015: 303-323 - 2014
- [c17]Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Intrusion detection system using Discrete Fourier Transform. CISDA 2014: 1-5 - [c16]Sachiko Kanamori, Kanako Kawaguchi, Hidema Tanaka:
Study on a scheme for the right to be forgotten. ISITA 2014: 55-59 - [c15]Junhan Park, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Analysis of Slow Read DoS attack. ISITA 2014: 60-64 - 2013
- [c14]Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Throughput and Power Efficiency Evaluations of Block Ciphers on Kepler and GCN GPUs. CANDAR 2013: 366-372 - [c13]Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Information Theoretical Analysis of Side-Channel Attack. ICISS 2013: 255-269 - [c12]Naoki Nishikawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Performance Prediction Model for Block Ciphers on GPU Architectures. NSS 2013: 405-423 - 2012
- [c11]Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
A Correlation Power Analysis Countermeasure for Enocoro-128 v2 Using Random Switching Logic. ICNC 2012: 326-328 - 2010
- [c10]Atsushi Waseda, Masahide Sasaki, Masahiro Takeoka, Mikio Fujiwara, Morio Toyoshima, Hidema Tanaka:
Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels. ARES 2010: 619-624 - 2007
- [c9]Hidema Tanaka:
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures. ICISS 2007: 167-179 - [c8]Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko:
Security Analysis of MISTY1. WISA 2007: 215-226 - 2005
- [c7]Duong Viet, Akihiro Yamamura, Hidema Tanaka:
Anonymous Password-Based Authenticated Key Exchange. INDOCRYPT 2005: 244-257 - 2004
- [c6]Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura:
Evaluation and Improvement of the Tempest Fonts. WISA 2004: 457-469 - 2003
- [c5]Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko:
An Optimized Algebraic Method for Higher Order Differential Attack. AAECC 2003: 61-70 - 2001
- [c4]Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka:
The Block Cipher SC2000. FSE 2001: 312-327 - 2000
- [c3]Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko:
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. ICISC 2000: 14-21 - 1999
- [c2]Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko:
Strenght of MISTY1 without FL Function for Higher Order Differential Attack. AAECC 1999: 221-230 - 1997
- [c1]Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko:
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. ISW 1997: 43-54
Informal and Other Publications
- 2009
- [i1]Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi, Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby Lenhart, Norbert Lütkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada, Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa Tomita, Morio Toyoshima, Rodney Van Meter, Atsuhiro Yamagishi, Yoshihisa Yamamoto, Akihiro Yamamura:
Updating Quantum Cryptography Report ver. 1. CoRR abs/0905.4325 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint