|
Search the dblp DataBase
Kazumaro Aoki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kazumaro Aoki, Helger Lipmaa
Fast Implementations of AES Candidates. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:106-120 [Conf]
- Kazumaro Aoki, Hiroki Ueda
Sieving Using Bucket Sort. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:92-102 [Conf]
- Kazumaro Aoki
Integer Factoring Utilizing PC Cluster. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:60- [Conf]
- Kazuo Ohta, Kazumaro Aoki
Linear Cryptanalysis of the Fast Data Encipherment Algorithm. [Citation Graph (0, 0)][DBLP] CRYPTO, 1994, pp:12-16 [Conf]
- Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
Improving the Search Algorithm for the Best Linear Expression. [Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:157-170 [Conf]
- Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai
Best Differential Characteristic Search of FEAL. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1997, pp:41-53 [Conf]
- Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
A Cyclic Window Algorithm for ECC Defined over Extension Fields. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:62-73 [Conf]
- Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
Elliptic Curve Arithmetic Using SIMD. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:235-247 [Conf]
- Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
Security of E2 against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:106-117 [Conf]
- Kazumaro Aoki
On Maximum Non-averaged Differential Probability. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:118-130 [Conf]
- Kazumaro Aoki
Efficient Evaluation of Security against Generalized Interpolation Attack. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:135-146 [Conf]
- Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:39-56 [Conf]
- Kazumaro Aoki, Serge Vaudenay
On the Use of GF-Inversion as a Cryptographic Primitive. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2003, pp:234-247 [Conf]
- Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:264-279 [Conf]
- Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:141-148 [Conf]
- Fumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki
Compressed Jacobian Coordinates for OEF. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:147-156 [Conf]
- Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:89-96 [Journal]
- Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
A Kilobit Special Number Field Sieve Factorization. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:1-12 [Conf]
- Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda
Experiments on the Linear Algebra Step in the Number Field Sieve. [Citation Graph (0, 0)][DBLP] IWSEC, 2007, pp:58-73 [Conf]
Preimage Attacks on Step-Reduced MD5. [Citation Graph (, )][DBLP]
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. [Citation Graph (, )][DBLP]
Preimage Attacks on 3, 4, and 5-Pass HAVAL. [Citation Graph (, )][DBLP]
Preimages for Step-Reduced SHA-2. [Citation Graph (, )][DBLP]
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. [Citation Graph (, )][DBLP]
Factorization of a 768-Bit RSA Modulus. [Citation Graph (, )][DBLP]
Finding Preimages in Full MD5 Faster Than Exhaustive Search. [Citation Graph (, )][DBLP]
A Preimage Attack for 52-Step HAS-160. [Citation Graph (, )][DBLP]
Preimage Attacks on One-Block MD4, 63-Step MD5 and More. [Citation Graph (, )][DBLP]
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.305secs
|