year | title | booktitle | pages | |
---|---|---|---|---|
1 | 2010 | Higher Order Differential Attack on Step-Reduced Variants of Luffa v1 | fse | online |
2 | 2009 | Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method | eprint | online |
3 | 1999 | Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials | asiacrypt | 43-51 |
4 | 1999 | Interpolation Attacks of the Block Cipher: SNAKE | fse | 275-289 |
5 | 1998 | Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES | crypto | 200-211 |
6 | 1998 | Higher Order Differential Attak of CAST Cipher | fse | 17-31 |
7 | 1991 | A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference | asiacrypt | 485-488 |