AOKI Kazumaro | NTT Laboratories
スポンサーリンク
概要
関連著者
-
AOKI Kazumaro
NTT Laboratories
-
OHTA Kazuo
NTT Laboratories
-
AOKI Kazumaro
NTT Communications Corporation
-
Aoki K
Ntt Corp. Yokosuka‐shi Jpn
-
Ohta K
Univ. Electro‐communications Chofu‐shi Jpn
-
Moriai S
Nippon Telegraph And Telephone Corp. Yokosuka‐shi Jpn
-
MORIAI Shiho
NTT Laboratories
-
UEDA Hiroki
NTT Laboratories
-
MORIAI Shiho
Information & Communication Security Project, Telecommunications Advancement Organization of Japan
-
Kanda M
Nippon Telegraph And Telephone Corporation
-
Matsui Mika
Graduate School Of Science And Engineering Yamaguchi University
-
Ueda H
Ntt Laboratories
-
KANDA Masayuki
NTT Laboratories
-
TAKASHIMA Youichi
NTT Laboratories
-
MATSUMOTO Tsutomu
Yokohama National University
-
MATSUI Mitsuru
Mitsubishi Electric Corporation
-
Moriai Shiho
Information & Communication Security Project Telecommunications Advancement Organization Of Japa
-
Matsui M
Graduate School Of Science And Engineering Yamaguchi University
-
Ohta Kazuo
Department Of Mathematics School Of Science And Engineering Waseda University
-
Matsumoto Tsutomu
Yokohama National Univ. Yokohama‐shi Jpn
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
KOBAYASHI Kunio
NTT Laboratories
著作論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability (Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Key-Dependency of Linear Probability of RC5 (Special Section on Cryptography and Information Security)
- The Best Linear Expression Search of FEAL (Special Section on Cryptography and Information Security)
- Optimized Software Implementations of E2(Special Section on Cryptography and Information Security)
- The Best Differential Characteristic Search of FEAL (Special Section on Cryptography and Information Security)
- Practical Evaluation of Security against Generalized Interpolation Attack(Special Section on Cryptography and Information Security)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)