Makoto Sugita

According to our database1, Makoto Sugita authored at least 13 papers between 1999 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Development strategy of disaster-resistant WiFi mesh networks and the disaster monitoring and reporting system in a local area.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
A network routing method based on received power of repeater nodes and QoS for mobile ad-hoc networks.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
A route control method based on cross layer approach between Physical and Media Access Control layer.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

2012
A route discovery method based on received power of repeater nodes for sensor networks.
Proceedings of the 2012 International Conference on Information Networking, 2012

2007
Algebraic Cryptanalysis of 58-Round SHA-1.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Relation between the XL Algorithm and Gröbner Basis Algorithms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Gröbner Basis Based Cryptanalysis of SHA-1.
IACR Cryptol. ePrint Arch., 2006

2004
Relation between XL algorithm and Gröbner Bases Algorithms.
IACR Cryptol. ePrint Arch., 2004

Comparison Between XL and Gröbner Basis Algorithms.
Proceedings of the Advances in Cryptology, 2004

2003
Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2001
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 2001

2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Security of E2 against Truncated Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999


  Loading...