SHIMOYAMA Takeshi | FUJITSU LABORATORIES Ltd
スポンサーリンク
概要
関連著者
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES LTD.
-
TAKENAKA MASAHIKO
FUJITSU LABORATORIES LTD
-
Izu Tetsuya
Fujitsu Laboratories Ltd.
-
Sasaki Yu
Ntt Informating Sharing Platform Laboratories Ntt Corporation
-
YAJIMA Jun
FUJITSU LABORATORIES Ltd.
-
KUNIHIRO Noboru
The University of Tokyo
-
OHTA Kazuo
University of Electro-Communications
-
SASAKI Yu
University of Electro-Communications
-
Naito Yusuke
University Of Electro-communications
-
MORIAI Shiho
NTT Laboratories
-
OHTA Kazuo
The University of Electro-Communications
-
IWASAKI Terutoshi
Chuo University
-
NAITO Yusuke
The University of Electro-Communications
-
SASAKI Yu
The University of Electro-Communications
-
PEYRIN Thomas
Versailles Saint-Quentin-en-Yvelines University
-
Moriai S
Nippon Telegraph And Telephone Corp. Yokosuka‐shi Jpn
-
Kunihiro Noboru
The University Of Electro-communications
-
Kaneko Toshinobu
Science University of Tokyo
-
Takenaka Masahiko
Fujitsu Laboratories Ltd.
-
KOSHIBA Takeshi
FUJITSU LABORATORIES LTD.
-
Shimoyama T
Fujitsu Lab. Ltd. Kawasaki‐shi Jpn
-
Kaneko T
Sci. Univ. Tokyo Chiba Jpn
-
Kaneko T
Tokyo Univ. Sci. Noda‐shi Jpn
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
Kunihiro Noboru
Univ. Tokyo Kashiwa‐shi Jpn
-
Shinohara Naoyuki
National Inst. Of Information And Communications Technol. Koganei‐shi Jpn
-
Omote Kazumasa
Japan Advanced Inst. Of Sci. And Technol.
-
OHTAHARA Chiaki
Graduate School of Science and Engineering, Informatics, Chuo Laboratories, Chuo University
-
Torii Satoru
Fujitsu Laboratories, Ltd.
-
TAKAGI Tsuyoshi
Kyushu University
-
HAYASHI Takuya
Kyushu University
-
OHTAHARA Chiaki
the Graduate School of Science and Engineering, Informatics, Chuo Laboratories, Chuo University
著作論文
- Extending Bleichenbachers Forgery Attack
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
- Extending Bleichenbacher's Forgery Attack
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160