The following pages link to Kazumaro Aoki (Q778933):
Displaying 39 items.
- On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet (Q778934) (← links)
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 (Q1784084) (← links)
- Parameter trade-offs for NFS and ECM (Q1800722) (← links)
- On quantum related-key attacks on iterated Even-Mansour ciphers (Q1800825) (← links)
- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis (Q2762783) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- The Security of the OCB Mode of Operation without the SPRP Assumption (Q2856166) (← links)
- An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12) (Q2867252) (← links)
- Compressed Jacobian Coordinates for OEF (Q2876972) (← links)
- How Much Can Complexity of Linear Cryptanalysis Be Reduced? (Q2942831) (← links)
- Preimage Attacks against PKC98-Hash and HAS-V (Q3094985) (← links)
- An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$ (Q3121357) (← links)
- Improved Integral Analysis on Tweaked Lesamnta (Q3168613) (← links)
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 (Q3183557) (← links)
- Preimage Attacks on Step-Reduced MD5 (Q3511170) (← links)
- Experiments on the Linear Algebra Step in the Number Field Sieve (Q3515104) (← links)
- Factorization of a 768-Bit RSA Modulus (Q3582763) (← links)
- Preimage Attacks on 3, 4, and 5-Pass HAVAL (Q3600379) (← links)
- Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition (Q3600511) (← links)
- Finding Preimages in Full MD5 Faster Than Exhaustive Search (Q3627432) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More (Q3644195) (← links)
- Preimages for Step-Reduced SHA-2 (Q3650715) (← links)
- (Q4250811) (← links)
- (Q4250823) (← links)
- (Q4343431) (← links)
- (Q4448402) (← links)
- (Q4473573) (← links)
- Best differential characteristic search of FEAL (Q4639325) (← links)
- The Security and Performance of “GCM” when Short Multiplications Are Used Instead (Q4922047) (← links)
- (Q4940675) (← links)
- (Q4949330) (← links)
- (Q4949332) (← links)
- Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1 (Q5170760) (← links)
- Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient (Q5300952) (← links)
- A Kilobit Special Number Field Sieve Factorization (Q5387089) (← links)
- Sieving Using Bucket Sort (Q5465841) (← links)
- FFT Key Recovery for Integral Attack (Q5498717) (← links)
- Selected Areas in Cryptography (Q5713960) (← links)