Author of the publication

Impossible Differential Cryptanalysis of Zodiac.

, , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (1): 38-43 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear Attack Using Multiple Linear Approximations., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 2-8 (2005)Impossible Differential Cryptanalysis of Zodiac., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (1): 38-43 (2002)Networking and Storage: The Next Computing Elements in Exascale Systems?, , , , and . IEEE Data Eng. Bull., 43 (1): 60-71 (2020)New Public-Key Cryptosystem Using Braid Groups., , , , , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 166-183. Springer, (2000)Semi-bent Functions., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 107-118. Springer, (1994)On the Correlation Immune Functions and Their Nonlinearity., , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 232-243. Springer, (1996)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , and . J. Cryptol., 19 (4): 441-462 (2006)A Study on Stability of the Interacting Multiple Model Algorithm., , and . IEEE Trans. Autom. Control., 62 (2): 901-906 (2017)Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics., , , , , and . J. Inf. Secur. Appl., (2022)NTFS Data Tracker: Tracking file data history based on $LogFile., , and . Digit. Investig., (2021)