Kazumaro Aoki
According to our database1,
Kazumaro Aoki
authored at least 66 papers
between 1994 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on flu.if0.org
On csauthors.net:
Bibliography
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
IACR Cryptol. ePrint Arch., 2019
2018
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Advances in Information and Computer Security, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
2016
Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
2014
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$.
JSIAM Lett., 2014
A Property for Full CLEFIA-128 Detected by a Middletext Distinguisher under the Known-Key Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Number Theory and Cryptography, 2013
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Clust. Comput., 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
2010
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Faster Implementation of eta-T Pairing over GF(3<sup>m</sup>) Using Minimum Number of Logical Instructions for GF(3)-Addition.
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Advances in Information and Computer Security, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Progressin Cryptology, 2006
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2004
IACR Cryptol. ePrint Arch., 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
IACR Cryptol. ePrint Arch., 2000
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Fast Implementations of AES Candidates.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
1998
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Selected Areas in Cryptography '98, 1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Advances in Cryptology, 1994