default search action
Kazumaro Aoki
Person information
- unicode name: 青木 和麻呂
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [e1]Kazumaro Aoki, Akira Kanaoka:
Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Fukui, Japan, September 2-4, 2020, Proceedings. Lecture Notes in Computer Science 12231, Springer 2020, ISBN 978-3-030-58207-4 [contents]
2010 – 2019
- 2019
- [j18]Kazumaro Aoki:
Towards Reducing the Gap between Cryptography and Its Usage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 11-16 (2019) - [j17]Akinori Hosoyamada, Kazumaro Aoki:
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 27-34 (2019) - [c45]Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. SAC 2019: 365-392 - [i9]Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. IACR Cryptol. ePrint Arch. 2019: 809 (2019) - 2018
- [c44]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c43]Kazumaro Aoki:
(Short Paper) Parameter Trade-Offs for NFS and ECM. IWSEC 2018: 114-123 - [i8]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - 2017
- [j16]Bungo Taga, Shiho Moriai, Kazumaro Aoki:
Related-Key Attacks on Reduced-Round Hierocrypt-L1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 126-137 (2017) - [c42]Akinori Hosoyamada, Kazumaro Aoki:
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers. IWSEC 2017: 3-18 - 2016
- [j15]Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, Masakatu Morii:
Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 31-38 (2016) - [c41]Yosuke Todo, Kazumaro Aoki:
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes. ACNS 2016: 467-484 - 2015
- [j14]Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji:
Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 192-202 (2015) - [j13]Yosuke Todo, Kazumaro Aoki:
Fast Fourier Transform Key Recovery for Integral Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(9): 1944-1952 (2015) - [i7]Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}. IACR Cryptol. ePrint Arch. 2015: 1179 (2015) - 2014
- [j12]Kazumaro Aoki:
A Property for Full CLEFIA-128 Detected by a Middletext Distinguisher under the Known-Key Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 292-297 (2014) - [j11]Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$. JSIAM Lett. 6: 53-56 (2014) - [c40]Bungo Taga, Shiho Moriai, Kazumaro Aoki:
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. ACISP 2014: 17-33 - [c39]Yosuke Todo, Kazumaro Aoki:
FFT Key Recovery for Integral Attack. CANS 2014: 64-81 - [c38]Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, Masakatu Morii:
How Much Can Complexity of Linear Cryptanalysis Be Reduced? ICISC 2014: 117-131 - 2013
- [j10]Yu Sasaki, Kazumaro Aoki:
Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 141-149 (2013) - [j9]Kazumaro Aoki:
Provable Security against Cryptanalysis with Impossible Differentials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 233-236 (2013) - [c37]Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji:
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient. ACISP 2013: 286-301 - [c36]Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12). Number Theory and Cryptography 2013: 108-120 - [c35]Kazumaro Aoki, Kan Yasuda:
The Security of the OCB Mode of Operation without the SPRP Assumption. ProvSec 2013: 202-220 - 2012
- [j8]Thorsten Kleinjung, Joppe W. Bos, Arjen K. Lenstra, Dag Arne Osvik, Kazumaro Aoki, Scott Contini, Jens Franke, Emmanuel Thomé, Pascal Jermini, Michela Thiémard, Paul C. Leyland, Peter L. Montgomery, Andrey Timofeev, Heinz Stockinger:
A heterogeneous computing environment to solve the 768-bit RSA challenge. Clust. Comput. 15(1): 53-68 (2012) - [j7]Yu Sasaki, Florian Mendel, Kazumaro Aoki:
Preimage Attacks against PKC98-Hash and HAS-V. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 111-124 (2012) - [c34]Kazumaro Aoki, Kan Yasuda:
The Security and Performance of "GCM" when Short Multiplications Are Used Instead. Inscrypt 2012: 225-245 - [c33]Kazumaro Aoki:
A middletext distinguisher for full CLEFIA-128. ISITA 2012: 521-525 - 2011
- [c32]Kazumaro Aoki, Krystian Matusiewicz, Günther Roland, Yu Sasaki, Martin Schläffer:
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl. ICETE (Selected Papers) 2011: 281-295 - [c31]Yu Sasaki, Kazumaro Aoki:
Improved Integral Analysis on Tweaked Lesamnta. ICISC 2011: 1-17 - [c30]Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer:
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. SECRYPT 2011: 124-133 - 2010
- [j6]Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro:
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 84-92 (2010) - [c29]Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, Paul Zimmermann:
Factorization of a 768-Bit RSA Modulus. CRYPTO 2010: 333-350 - [c28]Yu Sasaki, Florian Mendel, Kazumaro Aoki:
Preimage Attacks against PKC98-Hash and HAS-V. ICISC 2010: 68-91 - [i6]Thorsten Kleinjung, Kazumaro Aoki, Jens Franke, Arjen K. Lenstra, Emmanuel Thomé, Joppe W. Bos, Pierrick Gaudry, Alexander Kruppa, Peter L. Montgomery, Dag Arne Osvik, Herman J. J. te Riele, Andrey Timofeev, Paul Zimmermann:
Factorization of a 768-bit RSA modulus. IACR Cryptol. ePrint Arch. 2010: 6 (2010)
2000 – 2009
- 2009
- [j5]Kazumaro Aoki, Hiroki Ueda:
Bucket Sieving. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1845-1850 (2009) - [c27]Yu Sasaki, Kazumaro Aoki:
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. ACISP 2009: 214-231 - [c26]Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang:
Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597 - [c25]Kazumaro Aoki, Yu Sasaki:
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. CRYPTO 2009: 70-89 - [c24]Yu Sasaki, Kazumaro Aoki:
Finding Preimages in Full MD5 Faster Than Exhaustive Search. EUROCRYPT 2009: 134-152 - [i5]Yu Sasaki, Lei Wang, Kazumaro Aoki:
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. IACR Cryptol. ePrint Arch. 2009: 479 (2009) - 2008
- [c23]Yu Sasaki, Kazumaro Aoki:
Preimage Attacks on Step-Reduced MD5. ACISP 2008: 282-296 - [c22]Yu Sasaki, Kazumaro Aoki:
Preimage Attacks on 3, 4, and 5-Pass HAVAL. ASIACRYPT 2008: 253-271 - [c21]Yu Sasaki, Kazumaro Aoki:
A Preimage Attack for 52-Step HAS-160. ICISC 2008: 302-317 - [c20]Yuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi:
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. Pairing 2008: 282-296 - [c19]Kazumaro Aoki, Yu Sasaki:
Preimage Attacks on One-Block MD4, 63-Step MD5 and More. Selected Areas in Cryptography 2008: 103-119 - 2007
- [c18]Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik:
A Kilobit Special Number Field Sieve Factorization. ASIACRYPT 2007: 1-12 - [c17]Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda:
Experiments on the Linear Algebra Step in the Number Field Sieve. IWSEC 2007: 58-73 - [i4]Yu Sasaki, Go Yamamoto, Kazumaro Aoki:
Practical Password Recovery on an MD5 Challenge and Response. IACR Cryptol. ePrint Arch. 2007: 101 (2007) - [i3]Kazumaro Aoki, Jens Franke, Thorsten Kleinjung, Arjen K. Lenstra, Dag Arne Osvik:
A kilobit special number field sieve factorization. IACR Cryptol. ePrint Arch. 2007: 205 (2007) - 2006
- [j4]Tetsutaro Kobayashi, Kazumaro Aoki, Hideki Imai:
Efficient Algorithms for Tate Pairing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 134-143 (2006) - [c16]Kazumaro Aoki:
Integer Factoring Utilizing PC Cluster. CHES 2006: 60 - [c15]Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka:
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. SECRYPT 2006: 141-148 - [c14]Fumitaka Hoshino, Tetsutaro Kobayashi, Kazumaro Aoki:
Compressed Jacobian Coordinates for OEF. VIETCRYPT 2006: 147-156 - 2005
- [j3]Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii:
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 89-96 (2005) - 2004
- [c13]Kazumaro Aoki, Hiroki Ueda:
Sieving Using Bucket Sort. ASIACRYPT 2004: 92-102 - [i2]Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda:
GNFS Factoring Statistics of RSA-100, 110, ..., 150. IACR Cryptol. ePrint Arch. 2004: 95 (2004) - 2003
- [j2]Tetsutaro Kobayashi, Fumitaka Hoshino, Kazumaro Aoki:
A Cyclic Window Algorithm for Elliptic Curves over OEF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 121-128 (2003) - [c12]Kazumaro Aoki, Serge Vaudenay:
On the Use of GF-Inversion as a Cryptographic Primitive. Selected Areas in Cryptography 2003: 234-247 - 2002
- [j1]Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:
The 128-Bit Block Cipher Camellia. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 11-24 (2002) - 2001
- [c11]Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi:
A Cyclic Window Algorithm for ECC Defined over Extension Fields. ICICS 2001: 62-73 - [c10]Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro:
Elliptic Curve Arithmetic Using SIMD. ISC 2001: 235-247 - 2000
- [c9]Kazumaro Aoki, Helger Lipmaa:
Fast Implementations of AES Candidates. AES Candidate Conference 2000: 106-120 - [c8]Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Selected Areas in Cryptography 2000: 39-56 - [i1]Kazumaro Aoki:
The Complete Distribution of Linear Probabilities of MARS' s-box. IACR Cryptol. ePrint Arch. 2000: 33 (2000)
1990 – 1999
- 1999
- [c7]Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda:
Security of E2 against Truncated Differential Cryptanalysis. Selected Areas in Cryptography 1999: 106-117 - [c6]Kazumaro Aoki:
Efficient Evaluation of Security against Generalized Interpolation Attack. Selected Areas in Cryptography 1999: 135-146 - 1998
- [c5]Kazumaro Aoki:
On Maximum Non-averaged Differential Probability. Selected Areas in Cryptography 1998: 118-130 - [c4]Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta:
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. Selected Areas in Cryptography 1998: 264-279 - 1997
- [c3]Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai:
Best Differential Characteristic Search of FEAL. FSE 1997: 41-53 - 1995
- [c2]Kazuo Ohta, Shiho Moriai, Kazumaro Aoki:
Improving the Search Algorithm for the Best Linear Expression. CRYPTO 1995: 157-170 - 1994
- [c1]Kazuo Ohta, Kazumaro Aoki:
Linear Cryptanalysis of the Fast Data Encipherment Algorithm. CRYPTO 1994: 12-16
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint