|
Search the dblp DataBase
Makoto Sugita:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:242-254 [Conf]
- Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita
Comparison Between XL and Gröbner Basis Algorithms. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:338-353 [Conf]
- Makoto Sugita, Kazukuni Kobara, Hideki Imai
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:193-207 [Conf]
- Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
Security of E2 against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:106-117 [Conf]
- Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai
Algebraic Cryptanalysis of 58-Round SHA-1. [Citation Graph (0, 0)][DBLP] FSE, 2007, pp:349-365 [Conf]
Search in 0.002secs, Finished in 0.002secs
|