Follow
Takeshi Shimoyama
Takeshi Shimoyama
Verified email at nii.ac.jp
Title
Cited by
Cited by
Year
Localization and primary decomposition of polynomial ideals
T Shimoyama, K Yokoyama
Journal of Symbolic Computation 22 (3), 247-277, 1996
1671996
Secure pattern matching using somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 65-76, 2013
1422013
Packed homomorphic encryption based on ideal lattices and its application to biometrics
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
942013
Quadratic relation of S-box and its application to the linear attack of full round DES
T Shimoyama, T Kaneko
Annual International Cryptology Conference, 200-211, 1998
811998
Practical packing method in somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
692014
Higher order differential attack of a CAST cipher
S Moriai, T Shimoyama, T Kaneko
Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France …, 1998
651998
The block cipher SC2000
T Shimoyama, H Yanami, K Yokoyama, M Takenaka, K Itoh, J Yajima, ...
Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama …, 2002
582002
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)
T Hayashi, T Shimoyama, N Shinohara, T Takagi
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
532012
New packing method in somewhat homomorphic encryption and its applications
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security and Communication Networks 8 (13), 2194-2213, 2015
462015
Preimage attacks on the step-reduced RIPEMD-128 and RIPEMD-160
C Ohtahara, Y Sasaki, T Shimoyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2012
382012
Extended key preparing apparatus, extended key preparing method, recording medium and computer program
T Shimoyama, K Ito, M Takenaka, N Torii, J Yajima, H Yanami, ...
US Patent 6,956,951, 2005
342005
Wang's sufficient conditions of MD5 are not sufficient
J Yajima, T Shimoyama
Cryptology ePrint Archive, 2005
342005
Encryption processing apparatus and method
M Yasuda, T Shimoyama, J Kogure
US Patent 9,100,185, 2015
332015
A Grobner Basis Method for Modules over Rings of Differential Operators
T OAIKU, T Shimoyama
J. Symbolic Computation 18, 223-248, 1994
331994
Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
322014
Correlation attack to the block cipher RC5 and the simplified variants of RC6
T Shimoyama, K Takeuchi, J Hayakawa
Proceedings of the 3rd AES Conference (AES3), 2000
312000
Relational encryption for password verification
R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ...
US Patent 10,129,028, 2018
302018
Improved collision search for SHA-0
Y Naito, Y Sasaki, T Shimoyama, J Yajima, N Kunihiro, K Ohta
Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006
292006
Improving the higher order differential attack and cryptanalysis of the KN cipher
T Shimoyama, S Moriai, T Kaneko
International Workshop on Information Security, 32-42, 1997
271997
How to construct sufficient condition in searching collisions of MD5
Y Sasaki, Y Naito, J Yajima, T Shimoyama, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2006
252006
The system can't perform the operation now. Try again later.
Articles 1–20