关注
Takeshi Shimoyama
Takeshi Shimoyama
在 nii.ac.jp 的电子邮件经过验证
标题
引用次数
引用次数
年份
Localization and primary decomposition of polynomial ideals
T Shimoyama, K Yokoyama
Journal of Symbolic Computation 22 (3), 247-277, 1996
1711996
Secure pattern matching using somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 65-76, 2013
1442013
Packed homomorphic encryption based on ideal lattices and its application to biometrics
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
1002013
Quadratic relation of S-box and its application to the linear attack of full round DES
T Shimoyama, T Kaneko
Annual International Cryptology Conference, 200-211, 1998
811998
Practical packing method in somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
732014
Higher order differential attack of a CAST cipher
S Moriai, T Shimoyama, T Kaneko
Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France …, 1998
681998
The block cipher SC2000
T Shimoyama, H Yanami, K Yokoyama, M Takenaka, K Itoh, J Yajima, ...
Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama …, 2002
582002
New packing method in somewhat homomorphic encryption and its applications
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security and Communication Networks 8 (13), 2194-2213, 2015
552015
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)
T Hayashi, T Shimoyama, N Shinohara, T Takagi
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
542012
Preimage attacks on the step-reduced RIPEMD-128 and RIPEMD-160
C Ohtahara, Y Sasaki, T Shimoyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2012
382012
Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
362014
Extended key preparing apparatus, extended key preparing method, recording medium and computer program
T Shimoyama, K Ito, M Takenaka, N Torii, J Yajima, H Yanami, ...
US Patent 6,956,951, 2005
342005
Wang's sufficient conditions of MD5 are not sufficient
J Yajima, T Shimoyama
Cryptology ePrint Archive, 2005
342005
A Grobner Basis Method for Modules over Rings of Differential Operators
T OAIKU, T Shimoyama
J. Symbolic Computation 18, 223-248, 1994
341994
Encryption processing apparatus and method
M Yasuda, T Shimoyama, J Kogure
US Patent 9,100,185, 2015
332015
Relational encryption for password verification
R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ...
US Patent 10,129,028, 2018
302018
Correlation attack to the block cipher RC5 and the simplified variants of RC6
T Shimoyama, K Takeuchi, J Hayakawa
Proceedings of the 3rd AES Conference (AES3), 2000
302000
Improved collision search for SHA-0
Y Naito, Y Sasaki, T Shimoyama, J Yajima, N Kunihiro, K Ohta
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
282006
How to construct sufficient condition in searching collisions of MD5
Y Sasaki, Y Naito, J Yajima, T Shimoyama, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2006
262006
Improving the higher order differential attack and cryptanalysis of the KN cipher
T Shimoyama, S Moriai, T Kaneko
International Workshop on Information Security, 32-42, 1997
261997
系统目前无法执行此操作,请稍后再试。
文章 1–20