• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Tanaka Hidema  田中 秀磨

ORCIDConnect your ORCID iD *help
… Alternative Names

TANAKA Hidema  田中 秀磨

田中 秀磨  タナカ ヒデマ

Less
Researcher Number 30328570
External Links
Affiliation (Current) 2025: 防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工学群), 電気情報学群, 教授
Affiliation (based on the past Project Information) *help 2020 – 2022: 防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工学群), 電気情報学群, 教授
2017 – 2019: 防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工学群), 電気情報学群, 准教授
2012 – 2016: 防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工, 電気情報学群, 准教授
2013: 防衛大学校, 情報工学科, 准教授
2007: National Institute of Information and Communications Technology, 第三研究部門・情報通信セキュリティ研究センター・セキュリティ基盤グループ, 主任研究員 … More
2006: 独立行政法人情報通信研究機構, 第三研究部門情報通信セキュリティー研究センターセキュリティー基盤グループ, 主任研究員
2005: 独立行政法人情報通信研究機構, 情報通信部門セキュリティ基盤グループ, 研究員
2004: 独立行政法人情報通信研究機構, 情報通信部門・セキュリティ基盤グループ, 研究員
2003: 独立行政法人通信総合研究所, 情報通信部門・セキュリティ基盤グループ, 研究員
2002: 独立行政法人通信総合研究所, 研究員
2002: 独立行政法人通信総合研究所, 情報通信部門非常時通信グループ, 研究員 Less
Review Section/Research Field
Principal Investigator
Communication/Network engineering / 情報通信工学
Except Principal Investigator
情報通信工学 / Fundamental theory of informatics
Keywords
Principal Investigator
ネットワークセキュリティ / 軽量ブロック暗号 / 代数的手法 / サイドチャネル攻撃 / ブロック暗号 / 再生成符号 / トポロジーマップ / セキュアルーティング / 秘密分散 / 仮想環境 … More / Slow read dos 攻撃 / AMP攻撃 / Linguistic Approach / 機械学習 / proxyログ解析 / MILP / 条件付き閾値秘密分散 / 消失誤り訂正符号 / Division Property / 代数的攻撃手法 / 混合整数線形計画法 / WOTS+ / 秘密計算 / 位置情報 / AS / BKZアルゴリズム / 情報理論的安全性 / 視覚秘密分散 / マルコフ過程 / パスワード強度評価 / Integral property / LWE問題 / 擬似乱数 / 情報セキュリティ / 定量評価手法 / セキュリティ / セキュアパケット / 情報理論 / トポロジー解析 / IDS / 離散フーリエ変換 / DDoS攻撃 / カウンター攻撃 / integral攻撃 / 固有値解析 / 不正侵入検知 / プライバシー / 固有値 / 攻撃検知 / ネットワーク符号化 / テンペスト / 無線通信 / 暗号プロトコル / 情報漏洩 / 不要電磁波 / 代数的暗号解読アルゴリズム / 証明可能安全性 / 高階差分攻撃 / 数的暗号解読アルゴリズム / 暗号 / 弱鍵利用法 / 2段消去法 / 上1段消去法 / 代数的解読法 / ストリーム暗号 / 共通鍵暗号 … More
Except Principal Investigator
MISTY / Linear Sum Interpolation / Interpolation Attack / Higher Order Differential Attack / Linear Attack / Differential Attack / Cryptanalysis / Common Key Cryptography / ブロック暗号 / KASUMI / Camellia / 強度評価 / 差分確率 / 線形確率 / 共通鍵ブロック暗号 / 線形和攻撃 / 補間攻撃 / 高階差分攻撃 / 線形攻撃 / 差分攻撃 / 暗号解析 / 共通鍵暗号 / Threshold KEM / プロキシ暗号 / PRE / IDベース暗号 / 耐量子攻撃 / Threshold PKE / 秘密分散 / 準同型暗号 / 位置情報認証 / 準同型暗号応用 / クラウドストレージ / PRINCESS / プロキシ再暗号 / 非可換暗号 / LWE / Lattice / 暗号系 Less
  • Research Projects

    (6 results)
  • Research Products

    (78 results)
  • Co-Researchers

    (12 People)
  •  Research on dynamic network technology capable of automatic recovery and operation maintenancePrincipal Investigator

    • Principal Investigator
      Tanaka Hidema
    • Project Period (FY)
      2017 – 2022
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Communication/Network engineering
    • Research Institution
      防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工学群)
  •  Research on secure packet/routing on network codingPrincipal Investigator

    • Principal Investigator
      Tanaka Hidema
    • Project Period (FY)
      2012 – 2016
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Communication/Network engineering
    • Research Institution
      防衛大学校(総合教育学群、人文社会科学群、応用科学群、電気情報学群及びシステム工学群)
  •  R&D of New Cryptographic Technologies with Long-Term Usability

    • Principal Investigator
      WANG Lihua
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      National Institute of Information and Communications Technology
  •  不要電磁波解析による情報漏洩を防ぐセキュア無線通信プロトコルの開発Principal Investigator

    • Principal Investigator
      田中 秀磨
    • Project Period (FY)
      2005 – 2007
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Communication/Network engineering
    • Research Institution
      National Institute of Information and Communications Technology
  •  代数的暗号解読アルゴリズムに対して証明可能な安全性を実現する暗号設計法Principal Investigator

    • Principal Investigator
      田中 秀磨
    • Project Period (FY)
      2002 – 2004
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      情報通信工学
    • Research Institution
      National Institute of Information and Communications Technology
  •  Strength Evaluation Tools for Common-key Block Ciphers against Linear / Differential / Higher Order Differential / Interpolation / Linear Sum Attack

    • Principal Investigator
      KANEKO Toshinobu
    • Project Period (FY)
      2002 – 2003
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      情報通信工学
    • Research Institution
      Tokyo University of Science

All 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2011 2008 2007 2006 2005 2004 2003 Other

All Journal Article Presentation

  • [Journal Article] Improved scheme and evaluation method for progressive visual cryptography2022

    • Author(s)
      Le Thanh Thai Binh、Tanaka Hidema、Watanabe Kohtaro
    • Journal Title

      EURASIP Journal on Information Security

      Volume: 2022 Issue: 1 Pages: 1-13

    • DOI

      10.1186/s13635-022-00136-7

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Experimental Verification of?Estimated Block Size of?BKZ Algorithm Against LWE2021

    • Author(s)
      Takeshige Amane、Kosuge Haruhisa、Tanaka Hidema
    • Journal Title

      Book cover International Conference on Information Systems Security

      Volume: LNCS 13146 Pages: 173-184

    • DOI

      10.1007/978-3-030-92571-0_11

    • ISBN
      9783030925703, 9783030925710
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information2020

    • Author(s)
      Tanaka Hidema、Fukushima Keisuke
    • Journal Title

      Information System Security

      Volume: LNCS 12553 Pages: 221-240

    • DOI

      10.1007/978-3-030-65610-2_14

    • ISBN
      9783030656096, 9783030656102
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Reading Network Packets as a Natural Language for Intrusion Detection2018

    • Author(s)
      Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Security and Cryptology ICISC 2017

      Volume: 10779 Pages: 339-350

    • DOI

      10.1007/978-3-319-78556-1_19

    • ISBN
      9783319785554, 9783319785561
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs2018

    • Author(s)
      Mamoru Mimura Hidema Tanaka
    • Journal Title

      Information and Communications Security - 20th International Conference

      Volume: 11149 Pages: 708-718

    • DOI

      10.1007/978-3-030-01950-1_42

    • ISBN
      9783030019495, 9783030019501
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector2017

    • Author(s)
      Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Systems Security

      Volume: 10717 Pages: 146-163

    • DOI

      10.1007/978-3-319-72598-7_9

    • ISBN
      9783319725970, 9783319725987
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Analysis of Effectiveness of Slow Read DoS Attack and Influence of Communication Environment2017

    • Author(s)
      Shunsuke Tayama, Hidema Tanaka
    • Journal Title

      Computing and Networking (CANDAR) 2017 Fifth International Symposium on

      Volume: 1 Pages: 510-515

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] IDS: Spectrum Quantification Analysis using Discrete Fourier Transform2017

    • Author(s)
      Yusuke Tsuge, Hidema Tanaka
    • Journal Title

      International Journal of Cyber-Security and Digital Forensics

      Volume: Vol.5, No.4 Issue: 4 Pages: 197-202

    • DOI

      10.17781/p002219

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration2017

    • Author(s)
      Kosuge Haruhisa、Tanaka Hidema
    • Journal Title

      Progress in Cryptology - AFRICACRYPT 2017

      Volume: 10239 Pages: 95-113

    • DOI

      10.1007/978-3-319-57339-7_6

    • ISBN
      9783319573380, 9783319573397
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] TOPOLOGY MAP ANALYSIS FOR EFFECTIVE CHOICE OF NETWORK ATTACK SCENARIO2017

    • Author(s)
      Hidema Tanaka
    • Journal Title

      International Journal of Computer Networks & Communications

      Volume: vol.9 no.6 Issue: 6 Pages: 101-117

    • DOI

      10.5121/ijcnc.2017.9608

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] A Study on Effectiveness of Network Attack Using Analysis of Eigenvalue2017

    • Author(s)
      Ayumi Ishimaru, Hidema Tanaka
    • Journal Title

      Mobile and Wireless Technologies 2017

      Volume: 425 Pages: 340-349

    • DOI

      10.1007/978-981-10-5281-1_37

    • NAID

      170000173780

    • ISBN
      9789811052804, 9789811052811
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] A Practical Experiment of the HTTP-Based RAT Detection Method in Proxy Server Logs2017

    • Author(s)
      Mamoru Mimura, Yuhei Otsubo, Hidehiko Tanaka, Hidema Tanaka
    • Journal Title

      2017 12th Asia Joint Conference on Information Security (AsiaJCIS)

      Volume: 1 Pages: 31-37

    • DOI

      10.1109/asiajcis.2017.13

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Improvements on Security Evaluation of AES against Differential Bias Attack2017

    • Author(s)
      Haruhisa KOSUGE Hidema TANAKA
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E100.A Issue: 11 Pages: 2398-2407

    • DOI

      10.1587/transfun.E100.A.2398

    • NAID

      130006191409

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Dark Domain Name Attack: A New Threat to?Domain Name System2017

    • Author(s)
      Munkhbaatar Bold、Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Systems Security

      Volume: 10717 Pages: 405-414

    • DOI

      10.1007/978-3-319-72598-7_25

    • ISBN
      9783319725970, 9783319725987
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Leveraging Man-in-the-middle DoS Attack with?Internal TCP Retransmissions in?Virtual?Network2017

    • Author(s)
      Nguyen Son Duc、Mimura Mamoru、Tanaka Hidema
    • Journal Title

      Information Systems Security

      Volume: 10717 Pages: 367-386

    • DOI

      10.1007/978-3-319-72598-7_23

    • ISBN
      9783319725970, 9783319725987
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Is Emulating "Binary Grep in Eyes" Possible with Machine Learning?2017

    • Author(s)
      Mamoru Mimura, Yuhei Otsubo, Hidema Tanaka, Atsuhiro Goto
    • Journal Title

      Computing and Networking (CANDAR) 2017 Fifth International Symposium on

      Volume: 1 Pages: 337-343

    • NAID

      170000176493

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Analysis of Slow Read DoS Attack and Communication Environment2017

    • Author(s)
      Shunsuke Tayama, Hidema Tanaka
    • Journal Title

      Mobile and Wireless Technologies 2017

      Volume: 425 Pages: 350-359

    • DOI

      10.1007/978-981-10-5281-1_38

    • ISBN
      9789811052804, 9789811052811
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] EFFECTIVENESS AND WEAKNESS OF QUANTIFIED/AUTOMATED ANOMALY BASED IDS2017

    • Author(s)
      Hidema Tanaka
    • Journal Title

      International Journal of Network Security & Its Applications

      Volume: vol.9 no.6 Issue: 6 Pages: 1-11

    • DOI

      10.5121/ijnsa.2017.9601

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Long-Term Performance of a Generic Intrusion Detection Method Using Doc2vec2017

    • Author(s)
      Mamoru Mimura, Hidema Tanaka
    • Journal Title

      Computing and Networking (CANDAR) 2017 Fifth International Symposium on

      Volume: 1 Pages: 456-462

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Journal Article] Algebraic degree estimation for integral attack by randomized algorithm2017

    • Author(s)
      Haruhisa Kosuge, Hidema Tanaka
    • Journal Title

      Information Security Applications

      Volume: LNCS 10144 Pages: 292-304

    • DOI

      10.1007/978-3-319-56549-1_25

    • ISBN
      9783319565484, 9783319565491
    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Network Counter-attack Strategy by Topology Map Analysis2016

    • Author(s)
      Hidema Tanaka
    • Journal Title

      Information System Security

      Volume: LNCS 10063 Pages: 243-262

    • DOI

      10.1007/978-3-319-49806-5_13

    • ISBN
      9783319498058, 9783319498065
    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Security evaluation of light-weight block ciphers by GPGPU2016

    • Author(s)
      Haruhisa Kosuge, Hidema Tanaka
    • Journal Title

      International Journal on Cryptography and Information Security

      Volume: Vol.7, No.3 Issue: 3 Pages: 1-17

    • DOI

      10.5121/acij.2016.7301

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Improvement of search algorithm for integral distinguisher in subblock-based block cipher2016

    • Author(s)
      Haruhisa Kosuge, Hidema Tanaka
    • Journal Title

      International Journal on Cryptography and Information Security

      Volume: Vol.6.No.1/2 Issue: 1/2 Pages: 41-62

    • DOI

      10.5121/ijcis.2016.6203

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Intrusion Detection System using Discrete Fourier Transformation2016

    • Author(s)
      Yusuke Tsuge, Hidema Tanaka
    • Journal Title

      International Journal of Network Security & Its Applications,

      Volume: Vol.8, No.2 Issue: 2 Pages: 22-34

    • DOI

      10.5121/ijnsa.2016.8202

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Algebraic degree estimation of block ciphers using randomized algorithm; Upper-bound integral distinguisher2016

    • Author(s)
      Haruhisa Kosuge, Hidema Tanaka
    • Journal Title

      International Journal on Cryptography and Information Security

      Volume: Vol.6, No.3/4 Issue: 3/4 Pages: 9-29

    • DOI

      10.5121/ijcis.2016.6402

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Analysis of Slow Read DoS Attack and Countermeasures on Web servers2014

    • Author(s)
      Junhan Park, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Journal Title

      International Journal of Cyber-Security and Digital Forensics

      Volume: Vol.4 No.2 Pages: 339-353

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] Analysis of Side-Channel Attack Based on Information Theory2014

    • Author(s)
      Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Journal Title

      IEICE Transactions 97-A

      Volume: 7 Pages: 1523-1532

    • NAID

      130004519180

    • Peer Reviewed / Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中 秀磨,王 立華,市川 隆一,岩間 司,小山 泰弘
    • Journal Title

      IEICE

      Volume: Vol.J96-D, No.8 Pages: 1913-1924

    • NAID

      110009634962

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Security evaluation method for Generalized confidential modulation2013

    • Author(s)
      Hidema Tanaka
    • Journal Title

      Proceedings of ICCSEA-2013

      Volume: LNCS Pages: 1-16

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中秀磨, 王立華, 市川隆一, 岩間司, 小山泰弘
    • Journal Title

      電子情報通信学会誌

      Volume: Vol.J96-D,No.8

    • NAID

      110009634962

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Information Theoretical Analysis of Side-Channel Attack2013

    • Author(s)
      Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Journal Title

      Lecture Notes in Computer

      Volume: 8303 Pages: 255-269

    • DOI

      10.1007/978-3-642-45204-8_20

    • ISBN
      9783642452031, 9783642452048
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中秀磨、王立華、市川隆一、岩間司、小山泰弘
    • Journal Title

      電子情報通信学会論文誌

      Volume: Vol.J96-D,No.8 Pages: 1-14

    • NAID

      110009634962

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Journal Article] 準同型暗号技術による位置情報認証2013

    • Author(s)
      田中 秀磨, 王 立華, 市川 隆一, 岩間 司, 小山 泰弘
    • Journal Title

      IEICE

      Volume: J96-D(8) Pages: 1913-1924

    • NAID

      110009634962

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Journal Article] Evaluation of information leakage via electromagnetic emanation and effectiveness of Tempest2008

    • Author(s)
      Hidema Tanaka
    • Journal Title

      IEICE Transactions Vol.E91-D Vol.5

    • NAID

      10026803703

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17760325
  • [Journal Article] Information leakage via electromagnetic emanation and effectiveness of averaging technique2008

    • Author(s)
      Hidema Tanaka
    • Journal Title

      International Conference on Information Security Assurance, IEEE CS

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17760325
  • [Journal Article] 非意図的な電磁波放射を介して漏洩する情報量に関する考察(1)2007

    • Author(s)
      田中秀磨
    • Journal Title

      2007年 暗号と情報セキュリティシンポジウム予稿集 (CD-ROM)

      Pages: 6-6

    • Data Source
      KAKENHI-PROJECT-17760325
  • [Journal Article] Information Leakage Via Electromagnetic Emanation and Evaluation of Tempest Countermeasures2007

    • Author(s)
      Hidema Tanaka
    • Journal Title

      Information Systems Security, ICISS 2007, Lecture Notes in Computer Science 4812

      Pages: 167-179

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17760325
  • [Journal Article] 非意図的な電磁波放射を介して漏洩する情報量に関する考察(2)2007

    • Author(s)
      田中秀磨
    • Journal Title

      2007年 暗号と情報セキュリティシンポジウム予稿集 (CD-ROM)

      Pages: 6-6

    • Data Source
      KAKENHI-PROJECT-17760325
  • [Journal Article] Security of Authentication Key Exchange AddMA (EKE2)2006

    • Author(s)
      田中秀麿
    • Journal Title

      2006年 暗号と情報セキュリティシンポジウム(SCIS2006) (CD-ROM収録)

    • Data Source
      KAKENHI-PROJECT-17760325
  • [Journal Article] 放射電磁波を介して漏洩する情報量に関する考察2006

    • Author(s)
      田中秀磨
    • Journal Title

      第29回情報理論とその応用シンポジウム予稿集 第2分冊

      Pages: 657-660

    • NAID

      10022582321

    • Data Source
      KAKENHI-PROJECT-17760325
  • [Journal Article] 非線形コンバイナ型擬似乱数生成器に対する線形化攻撃に関する一考察2005

    • Author(s)
      田中秀磨
    • Journal Title

      2005年暗号と情報セキュリティシンポジウム予稿集 Vol II

      Pages: 415-420

    • Data Source
      KAKENHI-PROJECT-14750313
  • [Journal Article] Two round elimination attack using higher order differentials Of ICEBERG2004

    • Author(s)
      Hidema Tanaka
    • Journal Title

      Proceedings of International Symposium on Information Theory and its Applications 2004

      Pages: 949-952

    • Data Source
      KAKENHI-PROJECT-14750313
  • [Journal Article] Higher order differential cryptanalysis using weak keys condition2004

    • Author(s)
      Hidema Tanaka
    • Journal Title

      Control, Communication and Network Systems, Technologies and Applications Volume XI

      Pages: 186-191

    • Data Source
      KAKENHI-PROJECT-14750313
  • [Journal Article] Optimization for the Algebraic Method and Its Application to an Attack of MISTY12004

    • Author(s)
      Hidema Tanaka
    • Journal Title

      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Science Vol.E87-A No.1

      Pages: 18-27

    • NAID

      110003212728

    • Data Source
      KAKENHI-PROJECT-14750313
  • [Journal Article] An optimized Algebraic Method for Higher Order Differential Attack2003

    • Author(s)
      Y.Hatano, H.Tanaka, T.Kaneko
    • Journal Title

      Lecture Notes in Computer Science 2643

      Pages: 61-70

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-14550377
  • [Presentation] An analysis of password security risk against dictionary attacks2022

    • Author(s)
      Binh Thanh Thai Le、 Hidema Tanaka
    • Organizer
      The International Symposium on Information Theory and Its Applications 2022
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Presentation] Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo2019

    • Author(s)
      Hiroki Sato, Mamoru Miura, Hidema Tanaka
    • Organizer
      The 14th Asia Joint Conference on Information Security (AsiaJCIS2019)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Presentation] 軽量ブロック暗号PiccoloのMILP手法を用いたDivision Propertyの検証2018

    • Author(s)
      佐藤 寛樹、三村 守、田中 秀磨
    • Organizer
      コンピュータセキュリティシンポジウム2018
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Presentation] Verifiable Secret Sharing Scheme Using Hash Values2018

    • Author(s)
      Junta Imai, Mamoru Mimura, Hidema Tanaka
    • Organizer
      CANDAR Workshops 2018
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Presentation] 排他的論理和を用いた条件付き閾値秘密分散の構築2017

    • Author(s)
      今井淳太, 三村守, 田中秀磨
    • Organizer
      第40回情報理論とその応用シンポジウム (SITA2017)
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Presentation] 排他的論理和を用いた消失訂正符号に基づく条件付き閾値秘密分散2017

    • Author(s)
      今井淳太, 三村守, 田中秀磨
    • Organizer
      第16回 情報科学技術フォーラム(FIT 2017)
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Presentation] DNS水責め攻撃効果に関する一考察2017

    • Author(s)
      ムンフバートル ボルド, 三村守 ,田中秀磨
    • Organizer
      第16回 情報科学技術フォーラム(FIT 2017)
    • Data Source
      KAKENHI-PROJECT-17K06455
  • [Presentation] Quantification for Intrusion Detection System using Discrete Fourier Transform2016

    • Author(s)
      Yusuke Tsuge, Hidema Tanaka
    • Organizer
      International Conference on Information Science and Security 2016 (ICISS2016)
    • Place of Presentation
      タイ パタヤビーチ
    • Year and Date
      2016-12-19
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] IDS: Spectrum Quantification Analysis using Discrete Fourier Transform2016

    • Author(s)
      Yusuke Tsuge, Hidema Tanaka
    • Organizer
      The Second International Conference on Electronics and Software Science (ICESS2016)
    • Place of Presentation
      高松
    • Year and Date
      2016-11-14
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Network Attack Strategy by Topological Analysis2015

    • Author(s)
      Kengo Komoriya, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa
    • Organizer
      The Second International Conference on Information Security and Digital Forensics (ISDF2015)
    • Place of Presentation
      クアラルンプール マレーシア
    • Year and Date
      2015-09-08
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Search algorithm of precise integral distinguisher of byte-based block cipher2015

    • Author(s)
      Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, and Takakazu Kurokawa
    • Organizer
      Eleventh International Conference on Information Systems Security
    • Place of Presentation
      コルカタ インド
    • Year and Date
      2015-12-16
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Computational Security Evaluation of Light-Weight Block Cipher Against Integral Attack by GPGPU2015

    • Author(s)
      Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai and Takakazu Kurokawa
    • Organizer
      IEEE CScloud 2015
    • Place of Presentation
      ニューヨーク
    • Year and Date
      2015-11-03
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] トポロジー解析によるネットワーク攻撃に関する考察2015

    • Author(s)
      籠谷健吾, 岩井啓輔, 田中秀磨, 黒川恭一
    • Organizer
      日本オペレーションズ・リサーチ学会 2015年春季研究発表会
    • Place of Presentation
      東京
    • Year and Date
      2015-03-26
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Integral Attack on Reduced-Round Rectangle2015

    • Author(s)
      Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai and Takakazu Kurokawa
    • Organizer
      IEEE CScloud 2015
    • Place of Presentation
      ニューヨーク
    • Year and Date
      2015-11-03
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] 離散フーリエ変換用いたIDSに関する一考察2014

    • Author(s)
      チメドツェレン エンフボルド,岩井 啓輔, 田中 秀磨, 黒川 恭一
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      東京
    • Year and Date
      2014-05-09
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] サイドチャネル攻撃に関する情報理論的解析 (3)2014

    • Author(s)
      水野弘章、岩井啓輔、田中秀磨、黒川恭一
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      城山観光ホテル
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] スマートフォン利用における青少年のプライバシーに関する一考察2014

    • Author(s)
      金森祥子、川口嘉奈子、田中秀磨
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      城山観光ホテル
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] 個人情報と受動的プライバシーに関する一考察2013

    • Author(s)
      金森祥子、川口嘉奈子、田中秀磨
    • Organizer
      2013年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      京都
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] サイドチャネル攻撃に関する情報理論的解析2013

    • Author(s)
      水野弘章、岩井啓輔、田中秀磨、黒川恭一
    • Organizer
      2013年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      京都
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] 電波を使った位置情報認証2011

    • Author(s)
      王 立華, 田中 秀磨, 市川 隆一, 岩間 司, 小山 泰弘
    • Organizer
      第34回情報理論とその応用シンポジウムSITA2011
    • Place of Presentation
      岩手県岩手郡鶯宿ホテル森の風鶯宿
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] 電波を使った位置情報認証2011

    • Author(s)
      王 立華, 田中 秀磨, 市川 隆一, 岩間 司, 小山 泰弘
    • Organizer
      第34回情報理論とその応用シンポジウム(SITA2011)
    • Place of Presentation
      岩手県ホテル森の風鶯宿
    • Data Source
      KAKENHI-PROJECT-23500031
  • [Presentation] 電磁波を介した情報漏洩と平均化処理の効果に関する一考察2008

    • Author(s)
      田中 秀磨
    • Organizer
      2008年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      宮崎シーガイア
    • Year and Date
      2008-01-25
    • Data Source
      KAKENHI-PROJECT-17760325
  • [Presentation] Study on a Scheme for the Right to Be Forgotten

    • Author(s)
      Sachiko Kanamori, Kanako Kawaguchi, Hidema Tanaka
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Place of Presentation
      オーストラリア、メルボルン
    • Year and Date
      2014-10-26 – 2014-10-29
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] 軽量型ブロック暗号TWINEの高階差分特性

    • Author(s)
      小菅悠久, 岩井啓輔, 田中秀磨, 黒川恭一
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      札幌
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] A Study of IDS using DFT

    • Author(s)
      Enkhbold Chimedtseren,Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Organizer
      9th ACM Symposium on Information Computer and Communications Security
    • Place of Presentation
      京都
    • Year and Date
      2014-06-04 – 2014-06-06
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Intrusion Detection System using Discrete Fourier Transform

    • Author(s)
      Enkhbold Chimedtseren,Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Organizer
      7th IEEE Symposium on Computational Intelligence for Security and Defense Applications
    • Place of Presentation
      ベトナム、 ハノイ
    • Year and Date
      2014-12-14 – 2014-12-17
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] A Study of Intrusion Detection System using DFT

    • Author(s)
      Enkhbold Chimedtseren,Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Organizer
      The 2014 International Conference on Advanced Technologies for Communications
    • Place of Presentation
      ベトナム、ハノイ
    • Year and Date
      2014-10-15 – 2014-10-17
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Analysis of Slow Read DoS Attack

    • Author(s)
      Junhan Park, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Organizer
      9th ACM Symposium on Information Computer and Communications Security
    • Place of Presentation
      京都
    • Year and Date
      2014-06-04 – 2014-06-06
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Analysis of Slow Read DoS Attack and Countermeasures

    • Author(s)
      Junhan Park, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Organizer
      International Conference on Cyber-Crime Investigation and Cyber Security
    • Place of Presentation
      マレーシア、 クアラルンプール
    • Year and Date
      2014-11-17 – 2014-11-19
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Analysis of Slow Read DoS Attack

    • Author(s)
      Junhan Park, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
    • Organizer
      International Symposium on Information Theory and Its Applications
    • Place of Presentation
      オーストラリア、メルボルン
    • Year and Date
      2014-10-26 – 2014-10-29
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] SNSにおけるプライバシー保護技術の現状

    • Author(s)
      金森 祥子, 川口 嘉奈子, 田中秀磨
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      札幌
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] サイドチャネル攻撃に関する情報理論的解析 (2)

    • Author(s)
      水野弘章、岩井啓輔、田中秀磨、黒川恭一
    • Organizer
      情報セキュリティ研究会(ISEC)
    • Place of Presentation
      機械振興会館
    • Data Source
      KAKENHI-PROJECT-24560491
  • [Presentation] Slow Read DoS 攻撃とその対策に関する解析

    • Author(s)
      朴駿漢,岩井啓輔,田中秀磨,黒川恭一
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      札幌
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-24560491
  • 1.  KANEKO Toshinobu (20103038)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 1 results
  • 2.  WANG Lihua (00447228)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 5 results
  • 3.  MAMBO Masahiro (60251972)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 4.  AONO Yoshinori (50611125)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 5.  WASEDA Atsushi (10455454)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 6.  NOJIMA Ryo (40446597)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 7.  MORIAI Shiho (80636192)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 8.  LE Trieu Phong (40583191)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 9.  WANG Licheng
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 10.  CAO Zhenfu
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 11.  SHAO Jun
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 12.  BOYEN Xavier
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi