| 2008 |
| 27 | EE | Jun Yajima,
Terutoshi Iwasaki,
Yusuke Naito,
Yu Sasaki,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
A strict evaluation method on the number of conditions for the SHA-1 collision search.
ASIACCS 2008: 10-20 |
| 2007 |
| 26 | EE | Jun Yajima,
Yu Sasaki,
Yusuke Naito,
Terutoshi Iwasaki,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1.
ACISP 2007: 45-58 |
| 25 | EE | Tetsuya Izu,
Masahiko Takenaka,
Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack.
ARES 2007: 1167-1174 |
| 24 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Shimoyama:
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.
CHES 2007: 364-377 |
| 23 | | Takeshi Shimoyama,
Yoichi Muraoka:
Two Methods for Speeding Up Similarity Measurement for Profile Data.
IKE 2007: 67-71 |
| 22 | EE | Tetsuya Izu,
Takeshi Shimoyama,
Masahiko Takenaka:
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts.
IMA Int. Conf. 2007: 54-72 |
| 21 | EE | Kazumaro Aoki,
Takeshi Shimoyama,
Hiroki Ueda:
Experiments on the Linear Algebra Step in the Number Field Sieve.
IWSEC 2007: 58-73 |
| 20 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Koshiba,
Takeshi Shimoyama:
Low-density attack revisited.
Des. Codes Cryptography 43(1): 47-59 (2007) |
| 19 | EE | Ryoichi Honbo,
Youichi Murakami,
Koichiro Sawa,
Hiroyuki Wakabayashi,
Naruhiko Inayoshi,
Kyoji Inukai,
Takeshi Shimoyama,
Naoki Morita:
Development of the Lead-Free Brush Material for the High-Load Starter.
IEICE Transactions 90-C(8): 1634-1642 (2007) |
| 2006 |
| 18 | EE | Yusuke Naito,
Yu Sasaki,
Takeshi Shimoyama,
Jun Yajima,
Noboru Kunihiro,
Kazuo Ohta:
Improved Collision Search for SHA-0.
ASIACRYPT 2006: 21-36 |
| 17 | EE | Yu Sasaki,
Yusuke Naito,
Jun Yajima,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions.
VIETCRYPT 2006: 243-259 |
| 2005 |
| 16 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.
WISA 2005: 232-242 |
| 15 | EE | Ryoichi Honbo,
Koichiro Sawa,
Youichi Murakami,
Hiroyuki Wakabayashi,
Naruhiko Inayoshi,
Kyoji Inukai,
Takeshi Shimoyama,
Naoki Morita:
Development of the Lead-Free Carbon Brush Material for Starters.
IEICE Transactions 88-C(8): 1675-1681 (2005) |
| 2004 |
| 14 | EE | Masahiko Takenaka,
Takeshi Shimoyama,
Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6.
IEICE Transactions 87-A(1): 28-36 (2004) |
| 2003 |
| 13 | EE | Masahiko Takenaka,
Takeshi Shimoyama,
Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6.
ACISP 2003: 142-153 |
| 2002 |
| 12 | EE | Hitoshi Yanami,
Takeshi Shimoyama,
Orr Dunkelman:
Differential and Linear Cryptanalysis of a Reduced-Round SC2000.
FSE 2002: 34-48 |
| 11 | EE | Takeshi Shimoyama,
Masahiko Takenaka,
Takeshi Koshiba:
Multiple Linear Cryptanalysis of a Reduced Round RC6.
FSE 2002: 76-88 |
| 10 | EE | Hitoshi Yanami,
Takeshi Shimoyama:
Differential Cryptanalysis of a Reduced-Round SEED.
SCN 2002: 186-198 |
| 2001 |
| 9 | EE | Takeshi Shimoyama,
Hitoshi Yanami,
Kazuhiro Yokoyama,
Masahiko Takenaka,
Kouichi Itoh,
Jun Yajima,
Naoya Torii,
Hidema Tanaka:
The Block Cipher SC2000.
FSE 2001: 312-327 |
| 1999 |
| 8 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Interpolation Attacks of the Block Cipher: SNAKE.
FSE 1999: 275-289 |
| 1998 |
| 7 | EE | Takeshi Shimoyama,
Toshinobu Kaneko:
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES.
CRYPTO 1998: 200-211 |
| 6 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Higher Order Differential Attak of CAST Cipher.
FSE 1998: 17-31 |
| 5 | EE | Shiho Moriai,
Takeshi Shimoyama,
Toshinobu Kaneko:
Higher Order Differential Attack Using Chosen Higher Order Differences.
Selected Areas in Cryptography 1998: 106-117 |
| 1997 |
| 4 | | Takeshi Shimoyama,
Seiichi Amada,
Shiho Moriai:
Improved fast software implementation of block ciphers.
ICICS 1997: 269-273 |
| 3 | | Takeshi Shimoyama,
Shiho Moriai,
Toshinobu Kaneko:
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher.
ISW 1997: 32-42 |
| 1996 |
| 2 | | Takeshi Shimoyama,
Kazuhiro Yokoyama:
Localization and Primary Decomposition of Polynomial Ideals.
J. Symb. Comput. 22(3): 247-277 (1996) |
| 1994 |
| 1 | | Toshinori Oaku,
Takeshi Shimoyama:
A Gröbner Basis Method for Modules over Rings of Differential Operators.
J. Symb. Comput. 18(3): 223-248 (1994) |