The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kazumaro Aoki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kazumaro Aoki, Helger Lipmaa
    Fast Implementations of AES Candidates. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:106-120 [Conf]
  2. Kazumaro Aoki, Hiroki Ueda
    Sieving Using Bucket Sort. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:92-102 [Conf]
  3. Kazumaro Aoki
    Integer Factoring Utilizing PC Cluster. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:60- [Conf]
  4. Kazuo Ohta, Kazumaro Aoki
    Linear Cryptanalysis of the Fast Data Encipherment Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:12-16 [Conf]
  5. Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
    Improving the Search Algorithm for the Best Linear Expression. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:157-170 [Conf]
  6. Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai
    Best Differential Characteristic Search of FEAL. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:41-53 [Conf]
  7. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
    A Cyclic Window Algorithm for ECC Defined over Extension Fields. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:62-73 [Conf]
  8. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
    Elliptic Curve Arithmetic Using SIMD. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:235-247 [Conf]
  9. Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
    Security of E2 against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:106-117 [Conf]
  10. Kazumaro Aoki
    On Maximum Non-averaged Differential Probability. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:118-130 [Conf]
  11. Kazumaro Aoki
    Efficient Evaluation of Security against Generalized Interpolation Attack. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:135-146 [Conf]
  12. Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
    Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:39-56 [Conf]
  13. Kazumaro Aoki, Serge Vaudenay
    On the Use of GF-Inversion as a Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2003, pp:234-247 [Conf]
  14. Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta
    A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:264-279 [Conf]
  15. Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka
    Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:141-148 [Conf]
  16. Fumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki
    Compressed Jacobian Coordinates for OEF. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:147-156 [Conf]
  17. Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii
    Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:89-96 [Journal]
  18. Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik
    A Kilobit Special Number Field Sieve Factorization. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:1-12 [Conf]
  19. Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda
    Experiments on the Linear Algebra Step in the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:58-73 [Conf]

  20. Preimage Attacks on Step-Reduced MD5. [Citation Graph (, )][DBLP]


  21. Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. [Citation Graph (, )][DBLP]


  22. Preimage Attacks on 3, 4, and 5-Pass HAVAL. [Citation Graph (, )][DBLP]


  23. Preimages for Step-Reduced SHA-2. [Citation Graph (, )][DBLP]


  24. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. [Citation Graph (, )][DBLP]


  25. Factorization of a 768-Bit RSA Modulus. [Citation Graph (, )][DBLP]


  26. Finding Preimages in Full MD5 Faster Than Exhaustive Search. [Citation Graph (, )][DBLP]


  27. A Preimage Attack for 52-Step HAS-160. [Citation Graph (, )][DBLP]


  28. Preimage Attacks on One-Block MD4, 63-Step MD5 and More. [Citation Graph (, )][DBLP]


  29. Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002