The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mitsuru Matsui: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tetsuya Ichikawa, Tomomi Kasuya, Mitsuru Matsui
    Hardware Evaluation of the AES Finalists. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:279-285 [Conf]
  2. Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui
    Linear Cryptanalysis of LOKI and s2DES. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:293-303 [Conf]
  3. Mitsuru Matsui
    The First Experimental Cryptanalysis of the Data Encryption Standard. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:1-11 [Conf]
  4. Kazuo Ohta, Mitsuru Matsui
    Differential Attack on Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:200-211 [Conf]
  5. Junko Nakajima, Mitsuru Matsui
    Performance Analysis and Parallel Implementation of Dedicated Hash Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:165-180 [Conf]
  6. Mitsuru Matsui
    Linear Cryptoanalysis Method for DES Cipher. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:386-397 [Conf]
  7. Mitsuru Matsui
    On Correlation Between the Order of S-boxes and the Strength of DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:366-375 [Conf]
  8. Mitsuru Matsui, Atsuhiro Yamagishi
    A New Method for Known Plaintext Attack of FEAL Cipher. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:81-91 [Conf]
  9. Mitsuru Matsui
    New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:205-218 [Conf]
  10. Mitsuru Matsui
    New Block Encryption Algorithm MISTY. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:54-68 [Conf]
  11. Mitsuru Matsui, Sayaka Fukuda
    How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:398-412 [Conf]
  12. Mitsuru Matsui, Toshio Tokita
    Cryptanalysis of a Reduced Version of the Block Cipher E2. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:71-80 [Conf]
  13. Mitsuru Matsui
    How Far Can We Go on the x64 Processors? [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:341-358 [Conf]
  14. Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui
    A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:182-194 [Conf]
  15. Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
    Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:39-56 [Conf]
  16. Mitsuru Matsui, Junko Nakajima
    On the Power of Bitslice Implementation on Intel Core2 Processor. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:121-134 [Conf]

  17. Key Collisions of the RC4 Stream Cipher. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002