Kan Yasuda

1.2k total citations
17 papers, 93 citations indexed

About

Kan Yasuda is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Signal Processing. According to data from OpenAlex, Kan Yasuda has authored 17 papers receiving a total of 93 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 10 papers in Computer Vision and Pattern Recognition and 2 papers in Signal Processing. Recurrent topics in Kan Yasuda's work include Cryptographic Implementations and Security (11 papers), Chaos-based Image/Signal Encryption (10 papers) and Coding theory and cryptography (9 papers). Kan Yasuda is often cited by papers focused on Cryptographic Implementations and Security (11 papers), Chaos-based Image/Signal Encryption (10 papers) and Coding theory and cryptography (9 papers). Kan Yasuda collaborates with scholars based in Japan, India and Netherlands. Kan Yasuda's co-authors include Mridul Nandi, Nilanjan Datta, Yu Sasaki, Bart Mennink, Atul Luykx, Arthur T. Benjamin, Avijit Dutta, Philipp Jovanovic, Koji Chida and Elena Andreeva and has published in prestigious journals such as SHILAP Revista de lepidopterología, American Mathematical Monthly and Lecture notes in computer science.

In The Last Decade

Kan Yasuda

13 papers receiving 86 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Kan Yasuda Japan 5 81 58 10 6 6 17 93
Patrick Derbez France 6 77 1.0× 53 0.9× 13 1.3× 7 1.2× 10 1.7× 19 85
David Gérault Singapore 5 77 1.0× 52 0.9× 21 2.1× 12 2.0× 6 1.0× 11 84
Fukang Liu China 5 49 0.6× 29 0.5× 15 1.5× 8 1.3× 5 0.8× 29 75
Sebastian Szyller Canada 2 56 0.7× 31 0.5× 8 0.8× 11 1.8× 5 0.8× 3 72
Virginie Lallemand France 3 63 0.8× 49 0.8× 12 1.2× 13 2.2× 4 0.7× 10 69
Soroush Abbasi Koohpayegani United States 4 71 0.9× 42 0.7× 5 0.5× 10 1.7× 6 1.0× 8 94
Steve Babbage 1 56 0.7× 32 0.6× 11 1.1× 4 0.7× 6 1.0× 3 61
Tetsuya Ichikawa 4 96 1.2× 70 1.2× 20 2.0× 10 1.7× 6 1.0× 6 100
Itai Dinur Israel 6 49 0.6× 29 0.5× 10 1.0× 11 1.8× 6 1.0× 17 63
Taizo Shirai Japan 3 97 1.2× 70 1.2× 14 1.4× 11 1.8× 11 1.8× 4 109

Countries citing papers authored by Kan Yasuda

Since Specialization
Citations

This map shows the geographic impact of Kan Yasuda's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kan Yasuda with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kan Yasuda more than expected).

Fields of papers citing papers by Kan Yasuda

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kan Yasuda. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kan Yasuda. The network helps show where Kan Yasuda may publish in the future.

Co-authorship network of co-authors of Kan Yasuda

This figure shows the co-authorship network connecting the top 25 collaborators of Kan Yasuda. A scholar is included among the top collaborators of Kan Yasuda based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kan Yasuda. Kan Yasuda is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Nagao, Jiro, et al.. (2024). Standardization Trends Related to Application- and Service-related Technologies. NTT technical review. 22(1). 43–49.
2.
Andreeva, Elena, Andrey Bogdanov, Nilanjan Datta, et al.. (2024). The COLM Authenticated Encryption Scheme. Journal of Cryptology. 37(2). 1 indexed citations
3.
Fujioka, Atsushi, et al.. (2024). $k^{m}$-Anonymization Meets Differential Privacy Under Sampling. 109–114.
4.
Nandi, Mridul, et al.. (2020). On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security. SHILAP Revista de lepidopterología. 2 indexed citations
5.
Nandi, Mridul, et al.. (2020). On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security. IACR Transactions on Symmetric Cryptology. 1–39. 6 indexed citations
6.
Datta, Nilanjan, Avijit Dutta, Mridul Nandi, & Kan Yasuda. (2019). <inline-formula><tex-math id="M1">$\textsf{DWCDM+}$</tex-math></inline-formula>: A BBB secure nonce based MAC. Advances in Mathematics of Communications. 13(4). 705–732. 2 indexed citations
7.
Datta, Nilanjan, et al.. (2018). Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. IACR Transactions on Cryptographic Hardware and Embedded Systems. 218–241. 38 indexed citations
8.
Datta, Nilanjan, et al.. (2018). Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. SHILAP Revista de lepidopterología. 22 indexed citations
9.
Jovanovic, Philipp, Atul Luykx, Bart Mennink, Yu Sasaki, & Kan Yasuda. (2018). Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes. Journal of Cryptology. 32(3). 895–940. 6 indexed citations
10.
Sasaki, Yu & Kan Yasuda. (2018). Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E102.A(1). 35–47. 3 indexed citations
11.
Andreeva, Elena, Andrey Bogdanov, Atul Luykx, et al.. (2014). How to Securely Release Unverified Plaintext in Authenticated Encryption. Lecture notes in computer science. 2014. 105–125. 2 indexed citations
12.
Andreeva, Elena, Andrey Bogdanov, Atul Luykx, et al.. (2013). Parallelizable and Authenticated Online Ciphers. Lecture notes in computer science. 2013. 424–443.
13.
Suzuki, Koutarou & Kan Yasuda. (2012). On the Security of the Cryptographic Mask Generation Functions Standardized by ANSI, IEEE, ISO/IEC, and NIST. NTT technical review. 10(11). 70–78.
14.
Yasuda, Kan. (2012). A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96.A(1). 237–241. 1 indexed citations
15.
Yasuda, Kan. (2011). On the Full MAC Security of a Double-Piped Mode of Operation. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E94-A(1). 84–91. 2 indexed citations
16.
Yasuda, Kan & Yu Sasaki. (2010). Cryptographic Hash Functions:. IEICE ESS FUNDAMENTALS REVIEW. 4(1). 57–67. 6 indexed citations
17.
Benjamin, Arthur T. & Kan Yasuda. (1999). Magic "Squares" Indeed!. American Mathematical Monthly. 106(2). 152–152. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026