Cryptographers' World
 

Makoto Sugita



4 papers in database with 130 citations 

H-number: 4

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Makoto Sugita,  Mitsuru Kawazoe,  Ludovic Perret,  Hideki Imai,  Algebraic Cryptanalysis of 58-Round SHA-1, pp. 349 - 365, FSE 2007.

[Electronic Edition][Cited 14 times ]

2. Gw√©nol√© Ars,  Jean-Charles Faug√®re,  Hideki Imai,  Mitsuru Kawazoe,  Makoto Sugita,  Comparison Between XL and Gr√∂bner Basis Algorithms, pp. 338 - 353, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

3. Makoto Sugita,  Kazukuni Kobara,  Hideki Imai,  Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis, pp. 193 - 207, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

4. Shiho Moriai,  Makoto Sugita,  Kazumaro Aoki,  Masayuki Kanda,  Security of E2 against Truncated Differential Cryptanalysis, pp. 106 - 117, SAC 1999.

[Electronic Edition][Cited 12 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...