Cryptographers' World
 

Kazumaro Aoki


Author's Web Page Link

17 papers in database with 329 citations Star

H-number: 9

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Kazumaro Aoki,  Jian Guo,  Krystian Matusiewicz,  Yu Sasaki,  Lei Wang,  Preimages for Step-Reduced SHA-2, pp. 578 - 597, ASIACRYPT 2009.

[Electronic Edition][Cited 1 times ]

2. Kazumaro Aoki,  Yu Sasaki,  Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1, pp. 70 - 89, CRYPTO 2009.

[Electronic Edition][Cited 8 times ]

3. Yu Sasaki,  Kazumaro Aoki,  Finding Preimages in Full MD5 Faster Than Exhaustive Search, pp. 134 - 152, EUROCRYPT 2009.

[Electronic Edition][Cited 20 times ]

4. Yu Sasaki,  Kazumaro Aoki,  Preimage Attacks on 3, 4, and 5-Pass HAVAL, pp. 253 - 271, ASIACRYPT 2008.

[Electronic Edition][Cited 20 times ]

5. Kazumaro Aoki,  Jens Franke,  Thorsten Kleinjung,  Arjen K. Lenstra,  Dag Arne Osvik,  A Kilobit Special Number Field Sieve Factorization, pp. 1 - 12, ASIACRYPT 2007.

[Electronic Edition][Cited 22 times ]

6. Fumitaka Hoshino,  Tetsutaro Kobayashi,  Kazumaro Aoki,  Compressed Jacobian Coordinates for OEF, pp. 147 - 156, VIETCRYPT 2006.

[Electronic Edition][Cited 1 times ]

7. Kazumaro Aoki,  Integer Factoring Utilizing PC Cluster, pp. 60 - 60, CHES 2006.

[Electronic Edition][Cited 1 times ]

8. Kazumaro Aoki,  Hiroki Ueda,  Sieving Using Bucket Sort, pp. 92 - 102, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

9. Kazumaro Aoki,  Serge Vaudenay,  On the Use of GF-Inversion as a Cryptographic Primitive, pp. 234 - 247, SAC 2003.

[Electronic Edition][Cited 10 times ]

10. Kazumaro Aoki,  Tetsuya Ichikawa,  Masayuki Kanda,  Mitsuru Matsui,  Shiho Moriai,  Junko Nakajima,  Toshio Tokita,  Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis, pp. 39 - 56, SAC 2000.

[Electronic Edition][Cited 157 times Red StarRed Star]

11. Kazumaro Aoki,  Efficient Evaluation of Security against Generalized Interpolation Attack, pp. 135 - 146, SAC 1999.

[Electronic Edition][Cited 3 times ]

12. Shiho Moriai,  Makoto Sugita,  Kazumaro Aoki,  Masayuki Kanda,  Security of E2 against Truncated Differential Cryptanalysis, pp. 106 - 117, SAC 1999.

[Electronic Edition][Cited 12 times ]

13. Kazumaro Aoki,  On Maximum Non-averaged Differential Probability, pp. 118 - 130, SAC 1998.

[Electronic Edition][Cited 3 times ]

14. Masayuki Kanda,  Youichi Takashima,  Tsutomu Matsumoto,  Kazumaro Aoki,  Kazuo Ohta,  A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis, pp. 264 - 279, SAC 1998.

[Electronic Edition][Cited 34 times ]

15. Kazumaro Aoki,  Kunio Kobayashi,  Shiho Moriai,  Best Differential Characteristic Search of FEAL, pp. 41 - 53, FSE 1997.

[Electronic Edition][Cited 6 times ]

16. Kazuo Ohta,  Shiho Moriai,  Kazumaro Aoki,  Improving the Search Algorithm for the Best Linear Expression, pp. 157 - 170, CRYPTO 1995.

[Electronic Edition][Cited 10 times ]

17. Kazuo Ohta,  Kazumaro Aoki,  Linear Cryptanalysis of the Fast Data Encipherment Algorithm, pp. 12 - 16, CRYPTO 1994.

[Electronic Edition][Cited 15 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...