Factorization of a 768-bit RSA modulus T Kleinjung, K Aoki, J Franke, AK Lenstra, E Thomé, JW Bos, P Gaudry, ... Annual Cryptology Conference, 333-350, 2010 | 584 | 2010 |
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai, J Nakajima, T Tokita International workshop on selected areas in cryptography, 39-56, 2000 | 564 | 2000 |
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai, J Nakajima, T Tokita International workshop on selected areas in cryptography, 39-56, 2000 | 564 | 2000 |
Finding preimages in full MD5 faster than exhaustive search Y Sasaki, K Aoki Annual International Conference on the Theory and Applications of …, 2009 | 218 | 2009 |
Preimage attacks on one-block MD4, 63-step MD5 and more K Aoki, Y Sasaki International workshop on selected areas in cryptography, 103-119, 2008 | 171 | 2008 |
Preimage attacks on one-block MD4, 63-step MD5 and more K Aoki, Y Sasaki International workshop on selected areas in cryptography, 103-119, 2008 | 171 | 2008 |
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ... Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006 | 169* | 2006 |
Preimages for step-reduced SHA-2 K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang International Conference on the Theory and Application of Cryptology and …, 2009 | 127 | 2009 |
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1 K Aoki, Y Sasaki Annual International Cryptology Conference, 70-89, 2009 | 116 | 2009 |
Specification of Camellia-a 128-bit block cipher K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai, J Nakajima, T Tokita Specification Version 2, 2000 | 105 | 2000 |
Fast Implementations of AES Candidates. K Aoki, H Lipmaa AES Candidate Conference, 106-120, 2000 | 100 | 2000 |
A strategy for constructing fast round functions with practical security against differential and linear cryptanalysis M Kanda, Y Takashima, T Matsumoto, K Aoki, K Ohta International Workshop on Selected Areas in Cryptography, 264-279, 1998 | 74 | 1998 |
Strict evaluation of the maximum average of differential probability and the maximum average of linear probability K Aoki, K Ohta IEICE transactions on fundamentals of electronics, communications and …, 1997 | 72 | 1997 |
A kilobit special number field sieve factorization K Aoki, J Franke, T Kleinjung, AK Lenstra, DA Osvik International Conference on the Theory and Application of Cryptology and …, 2007 | 71 | 2007 |
Preimage attacks on 3, 4, and 5-pass HAVAL Y Sasaki, K Aoki International Conference on the theory and application of cryptology and …, 2008 | 57 | 2008 |
Fast integrity for large data G Yamamoto, S Oda, K Aoki Proc. ECRYPT Workshop Software Performance Enhancement for Encryption and …, 2007 | 50 | 2007 |
E2--A New 128-Bit Block Cipher M Kanda, S Moriai, K Aoki, H Ueda, Y Takashima, K Ohta, T Matsumoto IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2000 | 50 | 2000 |
Elliptic curve arithmetic using SIMD K Aoki, F Hoshino, T Kobayashi, H Oguro International Conference on Information Security, 235-247, 2001 | 45 | 2001 |
Improving the search algorithm for the best linear expression K Ohta, S Moriai, K Aoki Annual International Cryptology Conference, 157-170, 1995 | 43 | 1995 |
Security of E2 against truncated differential cryptanalysis S Moriai, M Sugita, K Aoki, M Kanda International Workshop on Selected Areas in Cryptography, 106-117, 1999 | 42 | 1999 |