Kazumaro Aoki
Kazumaro Aoki
Verified email at lab.ntt.co.jp - Homepage
Title
Cited by
Cited by
Year
Factorization of a 768-bit RSA modulus
T Kleinjung, K Aoki, J Franke, AK Lenstra, E Thomé, JW Bos, P Gaudry, ...
Annual Cryptology Conference, 333-350, 2010
5842010
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai, J Nakajima, T Tokita
International workshop on selected areas in cryptography, 39-56, 2000
5642000
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai, J Nakajima, T Tokita
International workshop on selected areas in cryptography, 39-56, 2000
5642000
Finding preimages in full MD5 faster than exhaustive search
Y Sasaki, K Aoki
Annual International Conference on the Theory and Applications of …, 2009
2182009
Preimage attacks on one-block MD4, 63-step MD5 and more
K Aoki, Y Sasaki
International workshop on selected areas in cryptography, 103-119, 2008
1712008
Preimage attacks on one-block MD4, 63-step MD5 and more
K Aoki, Y Sasaki
International workshop on selected areas in cryptography, 103-119, 2008
1712008
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
169*2006
Preimages for step-reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
International Conference on the Theory and Application of Cryptology and …, 2009
1272009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
K Aoki, Y Sasaki
Annual International Cryptology Conference, 70-89, 2009
1162009
Specification of Camellia-a 128-bit block cipher
K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai, J Nakajima, T Tokita
Specification Version 2, 2000
1052000
Fast Implementations of AES Candidates.
K Aoki, H Lipmaa
AES Candidate Conference, 106-120, 2000
1002000
A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis
M Kanda, Y Takashima, T Matsumoto, K Aoki, K Ohta
International Workshop on Selected Areas in Cryptography, 264-279, 1998
741998
Strict evaluation of the maximum average of differential probability and the maximum average of linear probability
K Aoki, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 1997
721997
A kilobit special number field sieve factorization
K Aoki, J Franke, T Kleinjung, AK Lenstra, DA Osvik
International Conference on the Theory and Application of Cryptology and …, 2007
712007
Preimage attacks on 3, 4, and 5-pass HAVAL
Y Sasaki, K Aoki
International Conference on the theory and application of cryptology and …, 2008
572008
Fast integrity for large data
G Yamamoto, S Oda, K Aoki
Proc. ECRYPT Workshop Software Performance Enhancement for Encryption and …, 2007
502007
E2--A New 128-Bit Block Cipher
M Kanda, S Moriai, K Aoki, H Ueda, Y Takashima, K Ohta, T Matsumoto
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2000
502000
Elliptic curve arithmetic using SIMD
K Aoki, F Hoshino, T Kobayashi, H Oguro
International Conference on Information Security, 235-247, 2001
452001
Improving the search algorithm for the best linear expression
K Ohta, S Moriai, K Aoki
Annual International Cryptology Conference, 157-170, 1995
431995
Security of E2 against truncated differential cryptanalysis
S Moriai, M Sugita, K Aoki, M Kanda
International Workshop on Selected Areas in Cryptography, 106-117, 1999
421999
The system can't perform the operation now. Try again later.
Articles 1–20