Search the dblp DataBase
Mitsuru Matsui :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tetsuya Ichikawa , Tomomi Kasuya , Mitsuru Matsui Hardware Evaluation of the AES Finalists. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:279-285 [Conf ] Toshio Tokita , Tohru Sorimachi , Mitsuru Matsui Linear Cryptanalysis of LOKI and s2 DES. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:293-303 [Conf ] Mitsuru Matsui The First Experimental Cryptanalysis of the Data Encryption Standard. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:1-11 [Conf ] Kazuo Ohta , Mitsuru Matsui Differential Attack on Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:200-211 [Conf ] Junko Nakajima , Mitsuru Matsui Performance Analysis and Parallel Implementation of Dedicated Hash Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:165-180 [Conf ] Mitsuru Matsui Linear Cryptoanalysis Method for DES Cipher. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:386-397 [Conf ] Mitsuru Matsui On Correlation Between the Order of S-boxes and the Strength of DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:366-375 [Conf ] Mitsuru Matsui , Atsuhiro Yamagishi A New Method for Known Plaintext Attack of FEAL Cipher. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:81-91 [Conf ] Mitsuru Matsui New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:205-218 [Conf ] Mitsuru Matsui New Block Encryption Algorithm MISTY. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:54-68 [Conf ] Mitsuru Matsui , Sayaka Fukuda How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:398-412 [Conf ] Mitsuru Matsui , Toshio Tokita Cryptanalysis of a Reduced Version of the Block Cipher E2. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:71-80 [Conf ] Mitsuru Matsui How Far Can We Go on the x64 Processors? [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:341-358 [Conf ] Toshio Hasegawa , Junko Nakajima , Mitsuru Matsui A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:182-194 [Conf ] Kazumaro Aoki , Tetsuya Ichikawa , Masayuki Kanda , Mitsuru Matsui , Shiho Moriai , Junko Nakajima , Toshio Tokita Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:39-56 [Conf ] Mitsuru Matsui , Junko Nakajima On the Power of Bitslice Implementation on Intel Core2 Processor. [Citation Graph (0, 0)][DBLP ] CHES, 2007, pp:121-134 [Conf ] Key Collisions of the RC4 Stream Cipher. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs