publications: - title: "An Offline Peer-to-peer Broadcasting Scheme with Anonymity" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Keith M. Martin" link: "https://researchr.org/alias/keith-m.-martin" year: "2009" tags: - "source-to-source" - "peer-to-peer" - "open-source" researchr: "https://researchr.org/publication/KiyomotoFM09" cites: 0 citedby: 0 pages: "75-82" booktitle: "SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications" editor: - name: "Eduardo Fernández-Medina" link: "https://researchr.org/alias/eduardo-fern%C3%A3%C2%A1ndez-medina" - name: "Manu Malek" link: "https://researchr.org/alias/manu-malek" - name: "Javier Hernando" link: "https://researchr.org/alias/javier-hernando" publisher: "INSTICC Press" isbn: "978-989-674-005-4" kind: "inproceedings" key: "KiyomotoFM09" - title: "Efficient Implementation of the Pairing on Mobilephones Using BREW" author: - name: "Motoi Yoshitomi" link: "https://researchr.org/alias/motoi-yoshitomi" - name: "Tsuyoshi Takagi" link: "https://researchr.org/alias/tsuyoshi-takagi" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2008" doi: "http://dx.doi.org/10.1093/ietisy/e91-d.5.1330" links: doi: "http://dx.doi.org/10.1093/ietisy/e91-d.5.1330" researchr: "https://researchr.org/publication/YoshitomiTKT08" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "91-D" number: "5" pages: "1330-1337" kind: "article" key: "YoshitomiTKT08" - title: "FPGA-Targeted Hardware Implementations of K2" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Kouichi Sakurai" link: "https://researchr.org/alias/kouichi-sakurai" year: "2008" researchr: "https://researchr.org/publication/KiyomotoTS08" cites: 0 citedby: 0 pages: "270-277" booktitle: "SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications" editor: - name: "Eduardo Fernández-Medina" link: "https://researchr.org/alias/eduardo-fern%C3%A3%C2%A1ndez-medina" - name: "Manu Malek" link: "https://researchr.org/alias/manu-malek" - name: "Javier Hernando" link: "https://researchr.org/alias/javier-hernando" publisher: "INSTICC Press" isbn: "978-989-8111-59-3" kind: "inproceedings" key: "KiyomotoTS08" - title: "On-the-Fly Automatic Generation of Security Protocols" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Haruki Ota" link: "https://researchr.org/alias/haruki-ota" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2008" tags: - "protocol" - "security" researchr: "https://researchr.org/publication/KiyomotoOT08" cites: 0 citedby: 0 pages: "97-104" booktitle: "ICEIS 2008 - Proceedings of the Tenth International Conference on Enterprise Information Systems, Volume ISAS-2, Barcelona, Spain, June 12-16, 2008" editor: - name: "José Cordeiro" link: "https://researchr.org/alias/jos%C3%A9-cordeiro" - name: "Joaquim Filipe" link: "https://researchr.org/alias/joaquim-filipe" isbn: "978-989-8111-38-8" kind: "inproceedings" key: "KiyomotoOT08" - title: "Anonymous attribute authentication scheme using self-blindable certificates" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2008" doi: "http://dx.doi.org/10.1109/ISI.2008.4565060" links: doi: "http://dx.doi.org/10.1109/ISI.2008.4565060" tags: - "certification" researchr: "https://researchr.org/publication/KiyomotoT08" cites: 0 citedby: 0 pages: "215-217" booktitle: "IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings" publisher: "IEEE" kind: "inproceedings" key: "KiyomotoT08" - title: "A New (k, n)-Threshold Secret Sharing Scheme and Its Extension" author: - name: "Jun Kurihara" link: "https://researchr.org/alias/jun-kurihara" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2008" doi: "http://dx.doi.org/10.1007/978-3-540-85886-7_31" links: doi: "http://dx.doi.org/10.1007/978-3-540-85886-7_31" researchr: "https://researchr.org/publication/KuriharaKFT08" cites: 0 citedby: 0 pages: "455-470" booktitle: "Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings" editor: - name: "Tzong-Chen Wu" link: "https://researchr.org/alias/tzong-chen-wu" - name: "Chin-Laung Lei" link: "https://researchr.org/alias/chin-laung-lei" - name: "Vincent Rijmen" link: "https://researchr.org/alias/vincent-rijmen" - name: "Der-Tsai Lee" link: "https://researchr.org/alias/der-tsai-lee" volume: "5222" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-540-85884-3" kind: "inproceedings" key: "KuriharaKFT08" - title: "Development of security functions for a medical information sharing platform" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Yutaka Miyake" link: "https://researchr.org/alias/yutaka-miyake" - name: "Yoshinori Mitamura" link: "https://researchr.org/alias/yoshinori-mitamura" year: "2007" doi: "http://dx.doi.org/10.1002/scj.20466" links: doi: "http://dx.doi.org/10.1002/scj.20466" tags: - "security" researchr: "https://researchr.org/publication/KiyomotoTMM07" cites: 0 citedby: 0 journal: "Systems and Computers in Japan" volume: "38" number: "11" pages: "49-63" kind: "article" key: "KiyomotoTMM07" - title: "The rakaposhi Stream Cipher" author: - name: "Carlos Cid" link: "https://researchr.org/alias/carlos-cid" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Jun Kurihara" link: "https://researchr.org/alias/jun-kurihara" year: "2009" doi: "http://dx.doi.org/10.1007/978-3-642-11145-7_5" links: doi: "http://dx.doi.org/10.1007/978-3-642-11145-7_5" researchr: "https://researchr.org/publication/CidKK09" cites: 0 citedby: 0 pages: "32-46" booktitle: "Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings" editor: - name: "Sihan Qing" link: "https://researchr.org/alias/sihan-qing" - name: "Chris J. Mitchell" link: "https://researchr.org/alias/chris-j.-mitchell" - name: "Guilin Wang" link: "https://researchr.org/alias/guilin-wang" volume: "5927" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-642-11144-0" kind: "inproceedings" key: "CidKK09" - title: "New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients" author: - name: "Akira Yamada" link: "https://researchr.org/alias/akira-yamada" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Koji Nakao" link: "https://researchr.org/alias/koji-nakao" year: "2004" doi: "http://search.ieice.org/bin/summary.php?id=e87-a_1_182&category=D&year=2004&lang=E&abst=" links: doi: "http://search.ieice.org/bin/summary.php?id=e87-a_1_182&category=D&year=2004&lang=E&abst=" researchr: "https://researchr.org/publication/YamadaKTN04" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "87-A" number: "1" pages: "182-189" kind: "article" key: "YamadaKTN04" - title: "A Fast (3, ::::n::::)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations" author: - name: "Jun Kurihara" link: "https://researchr.org/alias/jun-kurihara" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2008" doi: "http://dx.doi.org/10.1093/ietfec/e91-a.1.127" links: doi: "http://dx.doi.org/10.1093/ietfec/e91-a.1.127" researchr: "https://researchr.org/publication/KuriharaKFT08%3A0" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "91-A" number: "1" pages: "127-138" kind: "article" key: "KuriharaKFT08:0" - title: "On a Fast (::::k, n::::)-Threshold Secret Sharing Scheme" author: - name: "Jun Kurihara" link: "https://researchr.org/alias/jun-kurihara" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2008" doi: "http://dx.doi.org/10.1093/ietfec/e91-a.9.2365" links: doi: "http://dx.doi.org/10.1093/ietfec/e91-a.9.2365" researchr: "https://researchr.org/publication/KuriharaKFT08a" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "91-A" number: "9" pages: "2365-2378" kind: "article" key: "KuriharaKFT08a" - title: "Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Kouichi Sakurai" link: "https://researchr.org/alias/kouichi-sakurai" year: "2005" doi: "http://dx.doi.org/10.1093/ietfec/e88-a.10.2778" links: doi: "http://dx.doi.org/10.1093/ietfec/e88-a.10.2778" tags: - "analysis" researchr: "https://researchr.org/publication/KiyomotoTS05" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "88-A" number: "10" pages: "2778-2791" kind: "article" key: "KiyomotoTS05" - title: "Ternary Subset Difference Method and Its Quantitative Analysis" author: - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Kouichi Sakurai" link: "https://researchr.org/alias/kouichi-sakurai" year: "2008" doi: "http://dx.doi.org/10.1007/978-3-642-00306-6_17" links: doi: "http://dx.doi.org/10.1007/978-3-642-00306-6_17" tags: - "analysis" researchr: "https://researchr.org/publication/FukushimaKTS08%3A0" cites: 0 citedby: 0 pages: "225-239" booktitle: "Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers" editor: - name: "Kyo-Il Chung" link: "https://researchr.org/alias/kyo-il-chung" - name: "Kiwook Sohn" link: "https://researchr.org/alias/kiwook-sohn" - name: "Moti Yung" link: "https://researchr.org/alias/moti-yung" volume: "5379" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-642-00305-9" kind: "inproceedings" key: "FukushimaKTS08:0" - title: "K2: A Stream Cipher Algorithm using Dynamic Feedback Control" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Kouichi Sakurai" link: "https://researchr.org/alias/kouichi-sakurai" year: "2007" researchr: "https://researchr.org/publication/KiyomotoTS07" cites: 0 citedby: 0 pages: "204-213" booktitle: "SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications" editor: - name: "Javier Hernando" link: "https://researchr.org/alias/javier-hernando" - name: "Eduardo Fernández-Medina" link: "https://researchr.org/alias/eduardo-fern%C3%A3%C2%A1ndez-medina" - name: "Manu Malek" link: "https://researchr.org/alias/manu-malek" publisher: "INSTICC Press" isbn: "978-989-8111-12-8" kind: "inproceedings" key: "KiyomotoTS07" - title: "Analysis of Program Obfuscation Schemes with Variable Encoding Technique" author: - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Kouichi Sakurai" link: "https://researchr.org/alias/kouichi-sakurai" year: "2008" doi: "http://dx.doi.org/10.1093/ietfec/e91-a.1.316" links: doi: "http://dx.doi.org/10.1093/ietfec/e91-a.1.316" tags: - "program analysis" - "analysis" researchr: "https://researchr.org/publication/FukushimaKTS08" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "91-A" number: "1" pages: "316-329" kind: "article" key: "FukushimaKTS08" - title: "How to Bootstrap Security for Ad-Hoc Network: Revisited" author: - name: "Wook Shin" link: "https://researchr.org/alias/wook-shin" - name: "Carl A. Gunter" link: "https://researchr.org/alias/carl-a.-gunter" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2009" doi: "http://dx.doi.org/10.1007/978-3-642-01244-0_11" links: doi: "http://dx.doi.org/10.1007/978-3-642-01244-0_11" tags: - "security" researchr: "https://researchr.org/publication/ShinGKFT09" cites: 0 citedby: 0 pages: "119-131" booktitle: "Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings" editor: - name: "Dimitris Gritzalis" link: "https://researchr.org/alias/dimitris-gritzalis" - name: "Javier López" link: "https://researchr.org/alias/javier-l%C3%A3%C2%B3pez" volume: "297" series: "IFIP" publisher: "Springer" isbn: "978-3-642-01243-3" kind: "inproceedings" key: "ShinGKFT09" - title: "Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services" author: - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2006" doi: "http://doi.ieeecomputersociety.org/10.1109/MDM.2006.83" links: doi: "http://doi.ieeecomputersociety.org/10.1109/MDM.2006.83" tags: - "mobile" researchr: "https://researchr.org/publication/FukushimaKT06" cites: 0 citedby: 0 pages: "17" booktitle: "7th International Conference on Mobile Data Management (MDM 2006), Nara, Japan, May 9-13, 2006" publisher: "IEEE Computer Society" isbn: "0-7695-2526-1" kind: "inproceedings" key: "FukushimaKT06" - title: "Privacy-Aware Location Database Service for Granular Queries" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Keith M. Martin" link: "https://researchr.org/alias/keith-m.-martin" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" year: "2009" doi: "http://dx.doi.org/10.1007/978-3-642-03944-7_3" links: doi: "http://dx.doi.org/10.1007/978-3-642-03944-7_3" tags: - "database" - "context-aware" researchr: "https://researchr.org/publication/KiyomotoMF09" cites: 0 citedby: 0 pages: "28-37" booktitle: "Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings" editor: - name: "Olivier Markowitch" link: "https://researchr.org/alias/olivier-markowitch" - name: "Angelos Bilas" link: "https://researchr.org/alias/angelos-bilas" - name: "Jaap-Henk Hoepman" link: "https://researchr.org/alias/jaap-henk-hoepman" - name: "Chris J. Mitchell" link: "https://researchr.org/alias/chris-j.-mitchell" - name: "Jean-Jacques Quisquater" link: "https://researchr.org/alias/jean-jacques-quisquater" volume: "5746" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-642-03943-0" kind: "inproceedings" key: "KiyomotoMF09" - title: "Design of Anonymous Attribute Authentication Mechanism" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2009" doi: "http://search.ieice.org/bin/summary.php?id=e92-b_4_1112&category=B&year=2009&lang=E&abst=" links: doi: "http://search.ieice.org/bin/summary.php?id=e92-b_4_1112&category=B&year=2009&lang=E&abst=" tags: - "design" researchr: "https://researchr.org/publication/KiyomotoFT09" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "92-B" number: "4" pages: "1112-1118" kind: "article" key: "KiyomotoFT09" - title: "Universally Composable Hierarchical Hybrid Authenticated Key Exchange" author: - name: "Haruki Ota" link: "https://researchr.org/alias/haruki-ota" - name: "Kazuki Yoneyama" link: "https://researchr.org/alias/kazuki-yoneyama" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Kazuo Ohta" link: "https://researchr.org/alias/kazuo-ohta" year: "2007" doi: "http://dx.doi.org/10.1093/ietfec/e90-a.1.139" links: doi: "http://dx.doi.org/10.1093/ietfec/e90-a.1.139" researchr: "https://researchr.org/publication/OtaYKTO07" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "90-A" number: "1" pages: "139-151" kind: "article" key: "OtaYKTO07" - title: "Efficient Implementation of the Pairing on Mobilephones Using BREW" author: - name: "Motoi Yoshitomi" link: "https://researchr.org/alias/motoi-yoshitomi" - name: "Tsuyoshi Takagi" link: "https://researchr.org/alias/tsuyoshi-takagi" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2007" doi: "http://dx.doi.org/10.1007/978-3-540-77535-5_15" links: doi: "http://dx.doi.org/10.1007/978-3-540-77535-5_15" researchr: "https://researchr.org/publication/YoshitomiTKT07" cites: 0 citedby: 0 pages: "203-214" booktitle: "Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers" editor: - name: "Sehun Kim" link: "https://researchr.org/alias/sehun-kim" - name: "Moti Yung" link: "https://researchr.org/alias/moti-yung" - name: "Hyung-Woo Lee" link: "https://researchr.org/alias/hyung-woo-lee" volume: "4867" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-540-77534-8" kind: "inproceedings" key: "YoshitomiTKT07" - title: "Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification" author: - name: "Haruki Ota" link: "https://researchr.org/alias/haruki-ota" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2005" doi: "http://search.ieice.org/bin/summary.php?id=e88-a_1_287&category=D&year=2005&lang=E&abst=" links: doi: "http://search.ieice.org/bin/summary.php?id=e88-a_1_287&category=D&year=2005&lang=E&abst=" tags: - "transformation" researchr: "https://researchr.org/publication/OtaKT05" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "88-A" number: "1" pages: "287-295" kind: "article" key: "OtaKT05" - title: "Obfuscation Mechanism in Conjunction with Tamper-Proof Module" author: - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2009" doi: "http://dx.doi.org/10.1109/CSE.2009.20" links: doi: "http://dx.doi.org/10.1109/CSE.2009.20" researchr: "https://researchr.org/publication/FukushimaKT09" cites: 0 citedby: 0 pages: "665-670" booktitle: "Proceedings IEEE CSE 09, 12th IEEE International Conference on Computational Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada" publisher: "IEEE Computer Society" kind: "inproceedings" key: "FukushimaKT09" - title: "Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" year: "2006" doi: "http://dx.doi.org/10.1093/ietfec/e89-a.1.222" links: doi: "http://dx.doi.org/10.1093/ietfec/e89-a.1.222" researchr: "https://researchr.org/publication/KiyomotoT06" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "89-A" number: "1" pages: "222-226" kind: "article" key: "KiyomotoT06" - title: "On Effectiveness of Clock Control in Stream Ciphers" author: - name: "Shinsaku Kiyomoto" link: "http://sites.google.com/site/drshinsakukiyomoto/" - name: "Kazuhide Fukushima" link: "https://researchr.org/alias/kazuhide-fukushima" - name: "Toshiaki Tanaka" link: "https://researchr.org/alias/toshiaki-tanaka" - name: "Kouichi Sakurai" link: "https://researchr.org/alias/kouichi-sakurai" year: "2007" doi: "http://dx.doi.org/10.1093/ietfec/e90-a.9.1780" links: doi: "http://dx.doi.org/10.1093/ietfec/e90-a.9.1780" researchr: "https://researchr.org/publication/KiyomotoFTS07" cites: 0 citedby: 0 journal: "IEICE Transactions" volume: "90-A" number: "9" pages: "1780-1787" kind: "article" key: "KiyomotoFTS07"