A practical message falsification attack on WPA T Ohigashi, M Morii Proc. JWIS 54, 66, 2009 | 97 | 2009 |
Full Plaintext Recovery Attack on Broadcast RC4 T Isobe, T Ohigashi, Y Watanabe, M Morii International Workshop on Fast Software Encryption, 2013 | 84 | 2013 |
A performance improvement method for the global live migration of virtual machine with IP mobility H Watanabe, T Ohigashi, T Kondo, K Nishimura, R Aibara Proceedings of the Fifth International Conference on Mobile Computing and …, 2010 | 41 | 2010 |
How to recover any byte of plaintext on RC4 T Ohigashi, T Isobe, Y Watanabe, M Morii International Conference on Selected Areas in Cryptography, 155-173, 2013 | 31 | 2013 |
Falsification attacks against WPA-TKIP in a realistic environment Y Todo, Y Ozawa, T Ohigashi, M Morii IEICE TRANSACTIONS on Information and Systems 95 (2), 588-595, 2012 | 29 | 2012 |
Output prediction attacks on block ciphers using deep learning H Kimura, K Emura, T Isobe, R Ito, K Ogawa, T Ohigashi International Conference on Applied Cryptography and Network Security, 248-276, 2022 | 19 | 2022 |
An improved internal-state reconstruction method of a stream cipher RC4 Y Shiraishi, T Ohigashi, M Morii Communication, Network, and Information Security, Track, 440-088, 2003 | 18 | 2003 |
Fast WEP-key recovery attack using only encrypted IP packets R Teramura, Y Asakura, T Ohigashi, H Kuwakado, M Morii IEICE transactions on fundamentals of electronics, communications and …, 2010 | 16 | 2010 |
A generic construction of integrated secure-channel free PEKS and PKE and its application to EMRs in cloud storage T Suzuki, K Emura, T Ohigashi Journal of medical systems 43 (5), 128, 2019 | 15 | 2019 |
How to Break Py and Pypy by a Chosen-IV Attack T Isobe, T Ohigashi, HKM Morii eSTREAM, ECRYPT Stream Cipher Project, Report 60 (1), 3, 2006 | 15 | 2006 |
Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions and its implementations K Emura, H Kimura, T Ohigashi, T Suzuki The Computer Journal 62 (4), 614-630, 2019 | 14 | 2019 |
Development of the edge computing platform based on functional modulation architecture T Kondo, H Watanabe, T Ohigashi 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 13 | 2017 |
Slide cryptanalysis of lightweight stream cipher RAKAPOSHI T Isobe, T Ohigashi, M Morii Advances in Information and Computer Security: 7th International Workshop on …, 2012 | 12 | 2012 |
Implementation of a strongly robust identity-based encryption scheme over type-3 pairings H Okano, K Emura, T Ishibashi, T Ohigashi, T Suzuki International Journal of Networking and Computing 10 (2), 174-188, 2020 | 10 | 2020 |
Full plaintext recovery attacks on RC4 using multiple biases T Ohigashi, T Isobe, Y Watanabe, M Morii IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015 | 10 | 2015 |
New weakness in the key-scheduling algorithm of RC4 T Ohigashi, Y Shiraishi, M Morii IEICE transactions on fundamentals of electronics, communications and …, 2008 | 10 | 2008 |
A Key recovery attack on WEP with less packets T Ohigashi, H Kuwakado, M Morii IEICE Technical Report; IEICE Tech. Rep. 107 (346), 61-68, 2007 | 9 | 2007 |
Most IVs of FMS attack-resistant WEP implementation leak secret key information T Ohigashi Proc. of SCIS2005 4, 1957-1962, 2005 | 9 | 2005 |
FMS attack-resistant WEP implementation is still broken T Ohigashi, Y Shiraishi, M Morii Computational Intelligence and Security: International Conference, CIS 2005 …, 2005 | 9 | 2005 |
Verifiable functional encryption using intel SGX T Suzuki, K Emura, T Ohigashi, K Omote Provable and Practical Security: 15th International Conference, ProvSec 2021 …, 2021 | 8 | 2021 |