2008 |
7 | EE | Jun Yajima,
Terutoshi Iwasaki,
Yusuke Naito,
Yu Sasaki,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
A strict evaluation method on the number of conditions for the SHA-1 collision search.
ASIACCS 2008: 10-20 |
6 | EE | Dai Yamamoto,
Jun Yajima,
Kouichi Itoh:
A Very Compact Hardware Implementation of the MISTY1 Block Cipher.
CHES 2008: 315-330 |
2007 |
5 | EE | Jun Yajima,
Yu Sasaki,
Yusuke Naito,
Terutoshi Iwasaki,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1.
ACISP 2007: 45-58 |
2006 |
4 | EE | Yusuke Naito,
Yu Sasaki,
Takeshi Shimoyama,
Jun Yajima,
Noboru Kunihiro,
Kazuo Ohta:
Improved Collision Search for SHA-0.
ASIACRYPT 2006: 21-36 |
3 | EE | Yu Sasaki,
Yusuke Naito,
Jun Yajima,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions.
VIETCRYPT 2006: 243-259 |
2002 |
2 | EE | Kouichi Itoh,
Jun Yajima,
Masahiko Takenaka,
Naoya Torii:
DPA Countermeasures by Improving the Window Method.
CHES 2002: 303-317 |
2001 |
1 | EE | Takeshi Shimoyama,
Hitoshi Yanami,
Kazuhiro Yokoyama,
Masahiko Takenaka,
Kouichi Itoh,
Jun Yajima,
Naoya Torii,
Hidema Tanaka:
The Block Cipher SC2000.
FSE 2001: 312-327 |