| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2020 | Misc | ed. |
IWSEC
|
| 2019 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2019 | Misc | conf |
SAC
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2018 | Misc | conf |
IWSEC
|
| 2018 | — | conf |
CRYPTO (2)
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | Misc | conf |
IWSEC
|
| 2017 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2016 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2016 | B | conf |
ACNS
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2015 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2014 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2014 | J | jnl |
JSIAM Lett.
|
| 2014 | Misc | conf |
ACISP
|
| 2014 | B | conf |
CANS
|
| 2014 | Misc | conf |
ICISC
|
| 2013 | — | conf |
Number Theory and Cryptography
|
| 2013 | Misc | conf |
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
ACISP
|
| 2013 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2013 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2013 | C | conf |
ProvSec
|
| 2012 | J | jnl |
Clust. Comput.
|
| 2012 | C | conf |
ISITA
|
| 2012 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2012 | Misc | conf |
Inscrypt
|
| 2011 | C | conf |
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl.
SECRYPT
|
| 2011 | — | conf |
ICETE (Selected Papers)
|
| 2011 | Misc | conf |
ICISC
|
| 2010 | A* | conf |
CRYPTO
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2010 | Misc | conf |
ICISC
|
| 2009 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2009 | A* | conf |
EUROCRYPT
|
| 2009 | A* | conf |
CRYPTO
|
| 2009 | Misc | conf |
ACISP
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | A | conf |
ASIACRYPT
|
| 2008 | Misc | conf |
ICISC
|
| 2008 | C | conf |
Pairing
|
| 2008 | A | conf |
ASIACRYPT
|
| 2008 | B | conf |
Selected Areas in Cryptography
|
| 2008 | Misc | conf |
ACISP
|
| 2007 | A | conf |
ASIACRYPT
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | Misc | conf |
IWSEC
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | — | conf |
VIETCRYPT
|
| 2006 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2006 | C | conf |
SECRYPT
|
| 2006 | A | conf |
CHES
|
| 2005 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2004 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2004 | A | conf |
ASIACRYPT
|
| 2003 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2003 | B | conf |
Selected Areas in Cryptography
|
| 2002 | J | jnl |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
|
| 2001 | C | conf |
ICICS
|
| 2001 | C | conf |
ISC
|
| 2000 | B | conf |
Selected Areas in Cryptography
|
| 2000 | — | conf |
AES Candidate Conference
|
| 2000 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 1999 | B | conf |
Selected Areas in Cryptography
|
| 1999 | B | conf |
Selected Areas in Cryptography
|
| 1998 | B | conf |
Selected Areas in Cryptography
|
| 1998 | B | conf |
Selected Areas in Cryptography
|
| 1997 | A* | conf |
FSE
|
| 1995 | A* | conf |
CRYPTO
|
| 1994 | A* | conf |
CRYPTO
|