The SCEAS System
| |||||||

## Search the dblp DataBase
Kazumaro Aoki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Kazumaro Aoki, Helger Lipmaa
**Fast Implementations of AES Candidates.**[Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:106-120 [Conf] - Kazumaro Aoki, Hiroki Ueda
**Sieving Using Bucket Sort.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:92-102 [Conf] - Kazumaro Aoki
**Integer Factoring Utilizing PC Cluster.**[Citation Graph (0, 0)][DBLP] CHES, 2006, pp:60- [Conf] - Kazuo Ohta, Kazumaro Aoki
**Linear Cryptanalysis of the Fast Data Encipherment Algorithm.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1994, pp:12-16 [Conf] - Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
**Improving the Search Algorithm for the Best Linear Expression.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:157-170 [Conf] - Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai
**Best Differential Characteristic Search of FEAL.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1997, pp:41-53 [Conf] - Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
**A Cyclic Window Algorithm for ECC Defined over Extension Fields.**[Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:62-73 [Conf] - Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
**Elliptic Curve Arithmetic Using SIMD.**[Citation Graph (0, 0)][DBLP] ISC, 2001, pp:235-247 [Conf] - Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
**Security of E2 against Truncated Differential Cryptanalysis.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:106-117 [Conf] - Kazumaro Aoki
**On Maximum Non-averaged Differential Probability.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:118-130 [Conf] - Kazumaro Aoki
**Efficient Evaluation of Security against Generalized Interpolation Attack.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:135-146 [Conf] - Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
**Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:39-56 [Conf] - Kazumaro Aoki, Serge Vaudenay
**On the Use of GF-Inversion as a Cryptographic Primitive.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:234-247 [Conf] - Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta
**A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:264-279 [Conf] - Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka
**Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.**[Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:141-148 [Conf] - Fumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki
**Compressed Jacobian Coordinates for OEF.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:147-156 [Conf] - Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii
**Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:89-96 [Journal] - Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
**A Kilobit Special Number Field Sieve Factorization.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:1-12 [Conf] - Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda
**Experiments on the Linear Algebra Step in the Number Field Sieve.**[Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:58-73 [Conf] **Preimage Attacks on Step-Reduced MD5.**[Citation Graph (, )][DBLP]**Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.**[Citation Graph (, )][DBLP]**Preimage Attacks on 3, 4, and 5-Pass HAVAL.**[Citation Graph (, )][DBLP]**Preimages for Step-Reduced SHA-2.**[Citation Graph (, )][DBLP]**Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1.**[Citation Graph (, )][DBLP]**Factorization of a 768-Bit RSA Modulus.**[Citation Graph (, )][DBLP]**Finding Preimages in Full MD5 Faster Than Exhaustive Search.**[Citation Graph (, )][DBLP]**A Preimage Attack for 52-Step HAS-160.**[Citation Graph (, )][DBLP]**Preimage Attacks on One-Block MD4, 63-Step MD5 and More.**[Citation Graph (, )][DBLP]**Faster Implementation of eta-T Pairing over GF(3**[Citation Graph (, )][DBLP]^{m}) Using Minimum Number of Logical Instructions for GF(3)-Addition.
Search in 0.003secs, Finished in 0.005secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |