SASAKI Yu | University of Electro-Communications
スポンサーリンク
概要
関連著者
-
OHTA Kazuo
University of Electro-Communications
-
SASAKI Yu
University of Electro-Communications
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
WANG Lei
University of Electro-Communications
-
Kunihiro Noboru
Univ. Tokyo Kashiwa‐shi Jpn
-
KUNIHIRO Noboru
University of Electro-Communica-tions
-
KUNIHIRO Noboru
The University of Tokyo
-
SAKIYAMA Kazuo
University of Electro-Communications
-
Sasaki Yu
Ntt Information Sharing Platform Laboratories Ntt Corp.
-
Sasaki Yu
Ntt Informating Sharing Platform Laboratories Ntt Corporation
-
SASAKI Yu
NTT Information Sharing Platform Laboratories, NTT Corporation
-
Naito Yusuke
University Of Electro-communications
-
OHTA Kazuo
The University of Electro-Communications
-
Kunihiro Noboru
The University Of Electro-communications
-
Sakiyama Kazuo
Department Of Informatics The University Of Electro-communications
-
Sasaki Yu
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
YAJIMA Jun
FUJITSU LABORATORIES Ltd.
-
WANG Lei
The University of Electro-Communications
-
AOKI Kazumaro
NTT Information Sharing Platform Laboratories, NTT Corporation
-
IWASAKI Terutoshi
Chuo University
-
NAITO Yusuke
The University of Electro-Communications
-
SASAKI Yu
The University of Electro-Communications
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES LTD.
-
PEYRIN Thomas
Versailles Saint-Quentin-en-Yvelines University
-
Aoki Kazumaro
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Komatsubara Wataru
University Of Electro-communications
-
Aoki Kazumaro
Ntt Informating Sharing Platform Laboratories Ntt Corporation
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
著作論文
- Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
- Cryptanalysis of Two MD5-Based Authentication Protocols : APOP and NMAC
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- New Message Differences for Collision Attacks on MD4 and MD5
- Improved Collision Attacks on MD4 and MD5(Hash Functions,Cryptography and Information Security)
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128