Search of Paper Information

Search Results

Total 25 documents match your query. Current List: 1 - 10

Vol.E102-A No.1  pp.11-16
INVITED PAPER  
Towards Reducing the Gap between Cryptography and Its Usage
Kazumaro AOKI
Summary | Full Text:PDF(453KB)

Vol.E102-A No.1  pp.27-34
Special SectionPAPER  
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
Akinori HOSOYAMADAKazumaro AOKI
Summary | Full Text:PDF(908KB)

Vol.E100-A No.1  pp.126-137
Special SectionPAPER  
Related-Key Attacks on Reduced-Round Hierocrypt-L1
Bungo TAGAShiho MORIAIKazumaro AOKI
Summary | Full Text:PDF(1.1MB)

Vol.E99-A No.1  pp.31-38
Special SectionPAPER  
Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X
Sho SAKIKOYAMAYosuke TODOKazumaro AOKIMasakatu MORII
Summary | Full Text:PDF(1.1MB)

Vol.E98-A No.9  pp.1944-1952
PAPER  Cryptography and Information Security
Fast Fourier Transform Key Recovery for Integral Attacks
Yosuke TODOKazumaro AOKI
Summary | Full Text:PDF(867.4KB)

Vol.E98-A No.1  pp.192-202
Special SectionPAPER  Foundation
Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient
Junko TAKAHASHIToshinori FUKUNAGAKazumaro AOKIHitoshi FUJI
Summary | Full Text:PDF(1.8MB)

Vol.E97-A No.1  pp.292-297
Special SectionLETTER  
A Property for Full CLEFIA-128 Detected by a Middletext Distinguisher under the Known-Key Setting
Kazumaro AOKI
Summary | Full Text:PDF(125.9KB)

Vol.E96-A No.1  pp.141-149
Special SectionPAPER  Hash Functions
Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta
Yu SASAKIKazumaro AOKI
Summary | Full Text:PDF(467.5KB)

Vol.E96-A No.1  pp.233-236
Special SectionLETTER  
Provable Security against Cryptanalysis with Impossible Differentials
Kazumaro AOKI
Summary | Full Text:PDF(78.1KB)

Vol.E95-A No.1  pp.111-124
Special SectionPAPER  Hash Function
Preimage Attacks against PKC98-Hash and HAS-V
Yu SASAKIFlorian MENDELKazumaro AOKI
Summary | Full Text:PDF(677.5KB)

Current List: 1 - 10
<<123>>
go to Page Top