2009 |
25 | EE | Yu Sasaki,
Kazumaro Aoki:
Finding Preimages in Full MD5 Faster Than Exhaustive Search.
EUROCRYPT 2009: 134-152 |
2008 |
24 | EE | Yu Sasaki,
Kazumaro Aoki:
Preimage Attacks on Step-Reduced MD5.
ACISP 2008: 282-296 |
23 | EE | Yu Sasaki,
Kazumaro Aoki:
Preimage Attacks on 3, 4, and 5-Pass HAVAL.
ASIACRYPT 2008: 253-271 |
22 | EE | Yu Sasaki,
Kazumaro Aoki:
A Preimage Attack for 52-Step HAS-160.
ICISC 2008: 302-317 |
21 | EE | Yuto Kawahara,
Kazumaro Aoki,
Tsuyoshi Takagi:
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition.
Pairing 2008: 282-296 |
2007 |
20 | EE | Kazumaro Aoki,
Jens Franke,
Thorsten Kleinjung,
Arjen K. Lenstra,
Dag Arne Osvik:
A Kilobit Special Number Field Sieve Factorization.
ASIACRYPT 2007: 1-12 |
19 | EE | Kazumaro Aoki,
Takeshi Shimoyama,
Hiroki Ueda:
Experiments on the Linear Algebra Step in the Number Field Sieve.
IWSEC 2007: 58-73 |
2006 |
18 | EE | Kazumaro Aoki:
Integer Factoring Utilizing PC Cluster.
CHES 2006: 60 |
17 | | Kan Yasuda,
Kazumaro Aoki,
Eiichiro Fujisaki,
Atsushi Fujioka:
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
SECRYPT 2006: 141-148 |
16 | EE | Fumitaka Hoshino,
Tetsutaro Kobayashi,
Kazumaro Aoki:
Compressed Jacobian Coordinates for OEF.
VIETCRYPT 2006: 147-156 |
15 | EE | Tetsutaro Kobayashi,
Kazumaro Aoki,
Hideki Imai:
Efficient Algorithms for Tate Pairing.
IEICE Transactions 89-A(1): 134-143 (2006) |
2005 |
14 | EE | Masaki Gonda,
Kazuto Matsuo,
Kazumaro Aoki,
Jinhui Chao,
Shigeo Tsujii:
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.
IEICE Transactions 88-A(1): 89-96 (2005) |
2004 |
13 | EE | Kazumaro Aoki,
Hiroki Ueda:
Sieving Using Bucket Sort.
ASIACRYPT 2004: 92-102 |
2003 |
12 | EE | Kazumaro Aoki,
Serge Vaudenay:
On the Use of GF-Inversion as a Cryptographic Primitive.
Selected Areas in Cryptography 2003: 234-247 |
2001 |
11 | EE | Kazumaro Aoki,
Fumitaka Hoshino,
Tetsutaro Kobayashi:
A Cyclic Window Algorithm for ECC Defined over Extension Fields.
ICICS 2001: 62-73 |
10 | EE | Kazumaro Aoki,
Fumitaka Hoshino,
Tetsutaro Kobayashi,
Hiroaki Oguro:
Elliptic Curve Arithmetic Using SIMD.
ISC 2001: 235-247 |
2000 |
9 | | Kazumaro Aoki,
Helger Lipmaa:
Fast Implementations of AES Candidates.
AES Candidate Conference 2000: 106-120 |
8 | EE | Kazumaro Aoki,
Tetsuya Ichikawa,
Masayuki Kanda,
Mitsuru Matsui,
Shiho Moriai,
Junko Nakajima,
Toshio Tokita:
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.
Selected Areas in Cryptography 2000: 39-56 |
1999 |
7 | EE | Shiho Moriai,
Makoto Sugita,
Kazumaro Aoki,
Masayuki Kanda:
Security of E2 against Truncated Differential Cryptanalysis.
Selected Areas in Cryptography 1999: 106-117 |
6 | EE | Kazumaro Aoki:
Efficient Evaluation of Security against Generalized Interpolation Attack.
Selected Areas in Cryptography 1999: 135-146 |
1998 |
5 | EE | Kazumaro Aoki:
On Maximum Non-averaged Differential Probability.
Selected Areas in Cryptography 1998: 118-130 |
4 | EE | Masayuki Kanda,
Youichi Takashima,
Tsutomu Matsumoto,
Kazumaro Aoki,
Kazuo Ohta:
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Selected Areas in Cryptography 1998: 264-279 |
1997 |
3 | EE | Kazumaro Aoki,
Kunio Kobayashi,
Shiho Moriai:
Best Differential Characteristic Search of FEAL.
FSE 1997: 41-53 |
1995 |
2 | EE | Kazuo Ohta,
Shiho Moriai,
Kazumaro Aoki:
Improving the Search Algorithm for the Best Linear Expression.
CRYPTO 1995: 157-170 |
1994 |
1 | EE | Kazuo Ohta,
Kazumaro Aoki:
Linear Cryptanalysis of the Fast Data Encipherment Algorithm.
CRYPTO 1994: 12-16 |