Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Aoki, Kazumaro
add a person with the name Aoki, Kazumaro
 

Other publications of authors with the same name

A construction of 3-dimensional lattice sieve for number field sieve over F_p^n., , , and . IACR Cryptology ePrint Archive, (2015)On the Use of GF-Inversion as a Cryptographic Primitive., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 234-247. Springer, (2003)Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes., and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 467-484. Springer, (2016)Preimage Attacks on 3, 4, and 5-Pass HAVAL., and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 253-271. Springer, (2008)On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers., and . IWSEC, volume 10418 of Lecture Notes in Computer Science, page 3-18. Springer, (2017)Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation., , , , and . IEICE Transactions, 88-A (1): 89-96 (2005)Preimage Attacks against PKC98-Hash and HAS-V., , and . IEICE Transactions, 95-A (1): 111-124 (2012)Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols., , , , and . IEICE Transactions, 93-A (1): 84-92 (2010)On Maximum Non-averaged Differential Probability.. Selected Areas in Cryptography, volume 1556 of Lecture Notes in Computer Science, page 118-130. Springer, (1998)Preimage Attacks on One-Block MD4, 63-Step MD5 and More., and . Selected Areas in Cryptography, volume 5381 of Lecture Notes in Computer Science, page 103-119. Springer, (2008)