Kazumaro AOKI


Related-Key Attacks on Reduced-Round Hierocrypt-L1
Bungo TAGA Shiho MORIAI Kazumaro AOKI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 126-137
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysisHierocrypt-L1key scheduling differentials with probability 1related-key attacksimpossible differentialsCRYPTREC
 Summary | Full Text:PDF(1.1MB)

Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X
Sho SAKIKOYAMA Yosuke TODO Kazumaro AOKI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 31-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
linear cryptanalysisFFTFWHTmultiple linear cryptanalysisFEAL-8X
 Summary | Full Text:PDF(1.1MB)

Fast Fourier Transform Key Recovery for Integral Attacks
Yosuke TODO Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/09/01
Vol. E98-A  No. 9  pp. 1944-1952
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block ciphersintegral attackEven-Mansourkey-alternating cipherFeistel structureFFTFWHT
 Summary | Full Text:PDF(867.4KB)

Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient
Junko TAKAHASHI Toshinori FUKUNAGA Kazumaro AOKI Hitoshi FUJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 192-202
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundation
Keyword: 
side-channel attacksaccess-driven cache attacksblock cipherssoftware implementation
 Summary | Full Text:PDF(1.8MB)

A Property for Full CLEFIA-128 Detected by a Middletext Distinguisher under the Known-Key Setting
Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 292-297
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
CLEFIAhigher-order integralintegral attackmiddletext distinguisherknown-key attackzero-sum
 Summary | Full Text:PDF(125.9KB)

Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta
Yu SASAKI Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 141-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
integral attackmiddletext distinguisherknown-keychosen-keyLesamntahashSHA-3
 Summary | Full Text:PDF(467.5KB)

Provable Security against Cryptanalysis with Impossible Differentials
Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 233-236
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
impossible differentialcryptanalysis with impossible differentialsdifferential cryptanalysisprovable securityMarkov cipher
 Summary | Full Text:PDF(78.1KB)

Preimage Attacks against PKC98-Hash and HAS-V
Yu SASAKI Florian MENDEL Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 111-124
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
PKC98-HashHAS-VpreimageDavies-Meyernon-injective step function
 Summary | Full Text:PDF(677.5KB)

Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Yu SASAKI Lei WANG Kazuo OHTA Kazumaro AOKI Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 84-92
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
challenge and responseprefixhybridpassword recovery attacklocal collisionhash functionMD4
 Summary | Full Text:PDF(339.7KB)

Bucket Sieving
Kazumaro AOKI Hiroki UEDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1845-1850
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
integer factoringsieving algorithmnumber field sievelargish primebucket sortradix sort
 Summary | Full Text:PDF(207.6KB)

Efficient Algorithms for Tate Pairing
Tetsutaro KOBAYASHI Kazumaro AOKI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 134-143
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
Weil pairingTate pairingelliptic curve cryptosystemfast computation
 Summary | Full Text:PDF(207.6KB)

Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation
Masaki GONDA Kazuto MATSUO Kazumaro AOKI Jinhui CHAO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 89-96
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
genus 3 hyperelliptic curveshyperelliptic curve cryptosystemsaddition algorithmCantor algorithmHarley algorithmToom's multiplication
 Summary | Full Text:PDF(225.6KB)

A Cyclic Window Algorithm for Elliptic Curves over OEF
Tetsutaro KOBAYASHI Fumitaka HOSHINO Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 121-128
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Ciphers
Keyword: 
cyclic window algorithmoptimal extension fieldbase-φ expansionelliptic curve cryptosystem
 Summary | Full Text:PDF(244.7KB)

The 128-Bit Block Cipher Camellia
Kazumaro AOKI Tetsuya ICHIKAWA Masayuki KANDA Mitsuru MATSUI Shiho MORIAI Junko NAKAJIMA Toshio TOKITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 11-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherblock cipher designcryptanalysisCamellia
 Summary | Full Text:PDF(706.7KB)

Practical Evaluation of Security against Generalized Interpolation Attack
Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 33-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
interpolation attacklinear sum attackhigher order differential attackCRYPTONE2RIJNDAEL
 Summary | Full Text:PDF(264.6KB)

Optimized Software Implementations of E2
Kazumaro AOKI Hiroki UEDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 101-105
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
E2SPNoptimization32-bit processor64-bit processorinverse
 Summary | Full Text:PDF(233KB)

E2--A New 128-Bit Block Cipher
Masayuki KANDA Shiho MORIAI Kazumaro AOKI Hiroki UEDA Youichi TAKASHIMA Kazuo OHTA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 48-59
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
encryption algorithmblock cipherE2AESdesign strategy
 Summary | Full Text:PDF(1.3MB)

Linear Cryptanalysis of FEAL
Kazumaro AOKI Kazuo OHTA Shiho MORIAI Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 88-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
linear cryptanalysis1R-attack2R-attackeffective key bitseffective text bitsFEAL
 Summary | Full Text:PDF(776.8KB)

The Best Differential Characteristic Search of FEAL
Kazumaro AOKI Kunio KOBAYASHI Shiho MORIAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 98-104
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
search algorithmdifferential cryptanalysisbest differential characteristicFEAL
 Summary | Full Text:PDF(558.7KB)

Key-Dependency of Linear Probability of RC5
Shiho MORIAI Kazumaro AOKI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 9-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC5linear cryptanalysislinear probabilityweak keykey-dependency
 Summary | Full Text:PDF(660.8KB)

Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability
Kazumaro AOKI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 2-8
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Feistel cipherdifferential cryptanalysislinear cryptanalysisdifferential probabilitypotential of linear approximate hull
 Summary | Full Text:PDF(404.6KB)

Differential-Linear Cryptanalysis of FEAL-8
Kazumaro AOKI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 20-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
code breakblock cipherdifferential-linear cryptanalysisFEAL
 Summary | Full Text:PDF(561.5KB)

The Best Linear Expression Search of FEAL
Shiho MORIAI Kazumaro AOKI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 2-11
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Linear Cryptanalysisbest linear expressionFEALsearch algorithm
 Summary | Full Text:PDF(754.8KB)