Kazumaro Aoki

According to our database1, Kazumaro Aoki authored at least 66 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Towards Reducing the Gap between Cryptography and Its Usage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
IACR Cryptol. ePrint Arch., 2019

2018
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptol. ePrint Arch., 2018

(Short Paper) Parameter Trade-Offs for NFS and ECM.
Proceedings of the Advances in Information and Computer Security, 2018

2017
Related-Key Attacks on Reduced-Round Hierocrypt-L1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2016
Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Fast Fourier Transform Key Recovery for Integral Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}.
IACR Cryptol. ePrint Arch., 2015

2014
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$.
JSIAM Lett., 2014

A Property for Full CLEFIA-128 Detected by a Middletext Distinguisher under the Known-Key Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

How Much Can Complexity of Linear Cryptanalysis Be Reduced?
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

FFT Key Recovery for Integral Attack.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Provable Security against Cryptanalysis with Impossible Differentials.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

The Security of the OCB Mode of Operation without the SPRP Assumption.
Proceedings of the Provable Security - 7th International Conference, 2013

An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12).
Proceedings of the Number Theory and Cryptography, 2013

Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Preimage Attacks against PKC98-Hash and HAS-V.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A heterogeneous computing environment to solve the 768-bit RSA challenge.
Clust. Comput., 2012

A middletext distinguisher for full CLEFIA-128.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

The Security and Performance of "GCM" when Short Multiplications Are Used Instead.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Improved Integral Analysis on Tweaked Lesamnta.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

2010
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Factorization of a 768-bit RSA modulus.
IACR Cryptol. ePrint Arch., 2010

2009
Bucket Sieving.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512.
IACR Cryptol. ePrint Arch., 2009

Finding Preimages in Full MD5 Faster Than Exhaustive Search.
Proceedings of the Advances in Cryptology, 2009

Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1.
Proceedings of the Advances in Cryptology, 2009

Preimages for Step-Reduced SHA-2.
Proceedings of the Advances in Cryptology, 2009

Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Preimage Attacks on One-Block MD4, 63-Step MD5 and More.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Faster Implementation of eta-T Pairing over GF(3<sup>m</sup>) Using Minimum Number of Logical Instructions for GF(3)-Addition.
Proceedings of the Pairing-Based Cryptography, 2008

A Preimage Attack for 52-Step HAS-160.
Proceedings of the Information Security and Cryptology, 2008

Preimage Attacks on 3, 4, and 5-Pass HAVAL.
Proceedings of the Advances in Cryptology, 2008

Preimage Attacks on Step-Reduced MD5.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Practical Password Recovery on an MD5 Challenge and Response.
IACR Cryptol. ePrint Arch., 2007

A kilobit special number field sieve factorization.
IACR Cryptol. ePrint Arch., 2007

Experiments on the Linear Algebra Step in the Number Field Sieve.
Proceedings of the Advances in Information and Computer Security, 2007

2006
Efficient Algorithms for Tate Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Compressed Jacobian Coordinates for OEF.
Proceedings of the Progressin Cryptology, 2006

Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Proceedings of the SECRYPT 2006, 2006

Integer Factoring Utilizing PC Cluster.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2005
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
GNFS Factoring Statistics of RSA-100, 110, ..., 150.
IACR Cryptol. ePrint Arch., 2004

Sieving Using Bucket Sort.
Proceedings of the Advances in Cryptology, 2004

2003
A Cyclic Window Algorithm for Elliptic Curves over OEF.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

On the Use of GF-Inversion as a Cryptographic Primitive.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

2002
The 128-Bit Block Cipher <i>Camellia</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
Elliptic Curve Arithmetic Using SIMD.
Proceedings of the Information Security, 4th International Conference, 2001

A Cyclic Window Algorithm for ECC Defined over Extension Fields.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
The Complete Distribution of Linear Probabilities of MARS' s-box.
IACR Cryptol. ePrint Arch., 2000

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Fast Implementations of AES Candidates.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Security of E2 against Truncated Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Efficient Evaluation of Security against Generalized Interpolation Attack.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

1998
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Proceedings of the Selected Areas in Cryptography '98, 1998

On Maximum Non-averaged Differential Probability.
Proceedings of the Selected Areas in Cryptography '98, 1998

1997
Best Differential Characteristic Search of FEAL.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

1995
Improving the Search Algorithm for the Best Linear Expression.
Proceedings of the Advances in Cryptology, 1995

1994
Linear Cryptanalysis of the Fast Data Encipherment Algorithm.
Proceedings of the Advances in Cryptology, 1994


  Loading...