2007 |
6 | EE | Makoto Sugita,
Mitsuru Kawazoe,
Ludovic Perret,
Hideki Imai:
Algebraic Cryptanalysis of 58-Round SHA-1.
FSE 2007: 349-365 |
2006 |
5 | EE | Makoto Sugita,
Mitsuru Kawazoe,
Hideki Imai:
Relation between the XL Algorithm and Gröbner Basis Algorithms.
IEICE Transactions 89-A(1): 11-18 (2006) |
2004 |
4 | EE | Gwénolé Ars,
Jean-Charles Faugère,
Hideki Imai,
Mitsuru Kawazoe,
Makoto Sugita:
Comparison Between XL and Gröbner Basis Algorithms.
ASIACRYPT 2004: 338-353 |
2001 |
3 | EE | Makoto Sugita,
Kazukuni Kobara,
Hideki Imai:
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
ASIACRYPT 2001: 193-207 |
2000 |
2 | | Makoto Sugita,
Kazukuni Kobara,
Kazuhiro Uehara,
Shuji Kubota,
Hideki Imai:
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
AES Candidate Conference 2000: 242-254 |
1999 |
1 | EE | Shiho Moriai,
Makoto Sugita,
Kazumaro Aoki,
Masayuki Kanda:
Security of E2 against Truncated Differential Cryptanalysis.
Selected Areas in Cryptography 1999: 106-117 |