| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2007 | Low-Density Attack Revisited | eprint | online |
| 2 | 2007 | CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method | ches | 364-377 |
| 3 | 2006 | Message Modification for Step 21-23 on SHA-0 | eprint | online |
| 4 | 2006 | How to Construct Sufficient Condition in Searching Collisions of MD5 | eprint | online |
| 5 | 2006 | Improved Collision Search for SHA-0 | asiacrypt | online |
| 6 | 2005 | Wang's sufficient conditions of MD5 are not sufficient | eprint | online |
| 7 | 2004 | GNFS Factoring Statistics of RSA-100, 110, ..., 150 | eprint | online |
| 8 | 2002 | Differential and Linear Cryptanalysis of a Reduced-Round SC2000 | fse | online |
| 9 | 2002 | Multiple Linear Cryptanalysis of a Reduced Round RC6 | fse | online |
| 10 | 2002 | Theoretical Analysis of ``Correlations in RC6'' | eprint | online |
| 11 | 2001 | The Block Cipher SC2000 | fse | 312-327 |
| 12 | 1999 | Interpolation Attacks of the Block Cipher: SNAKE | fse | 275-289 |
| 13 | 1998 | Higher Order Differential Attak of CAST Cipher | fse | 17-31 |
| 14 | 1998 | Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES | crypto | 200-211 |
Coauthors of Takeshi Shimoyama |