Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Shimoyama, Takeshi
add a person with the name Shimoyama, Takeshi
 

Other publications of authors with the same name

Extending Bleichenbacher's Forgery Attack., , and . JIP, (2008)Development of the Lead-Free Brush Material for the High-Load Starter., , , , , , , and . IEICE Transactions, 90-C (8): 1634-1642 (2007)Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward., , , and . WISA, volume 7115 of Lecture Notes in Computer Science, page 40-54. Springer, (2011)Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption., , , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 338-353. Springer, (2014)The Block Cipher SC2000., , , , , , , and . FSE, volume 2355 of Lecture Notes in Computer Science, page 312-327. Springer, (2001)Experiments on the Linear Algebra Step in the Number Field Sieve., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 58-73. Springer, (2007)Differential Cryptanalysis of a Reduced-Round SEED., and . SCN, volume 2576 of Lecture Notes in Computer Science, page 186-198. Springer, (2002)Practical Packing Method in Somewhat Homomorphic Encryption., , , , and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 34-50. Springer, (2013)Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 125-138. Springer, (2007)Improved fast software implementation of block ciphers., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 269-273. Springer, (1997)