Localization and primary decomposition of polynomial ideals T Shimoyama, K Yokoyama Journal of Symbolic Computation 22 (3), 247-277, 1996 | 174 | 1996 |
Secure pattern matching using somewhat homomorphic encryption M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 65-76, 2013 | 146 | 2013 |
Packed homomorphic encryption based on ideal lattices and its application to biometrics M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 102 | 2013 |
Quadratic relation of S-box and its application to the linear attack of full round DES T Shimoyama, T Kaneko Annual International Cryptology Conference, 200-211, 1998 | 83 | 1998 |
Practical packing method in somewhat homomorphic encryption M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014 | 73 | 2014 |
Higher order differential attack of a CAST cipher S Moriai, T Shimoyama, T Kaneko Fast Software Encryption: 5th International Workshop, FSE’98 Paris, France …, 1998 | 68 | 1998 |
The block cipher SC2000 T Shimoyama, H Yanami, K Yokoyama, M Takenaka, K Itoh, J Yajima, ... Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama …, 2002 | 59 | 2002 |
New packing method in somewhat homomorphic encryption and its applications M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Security and Communication Networks 8 (13), 2194-2213, 2015 | 56 | 2015 |
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397) T Hayashi, T Shimoyama, N Shinohara, T Takagi Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 55 | 2012 |
Preimage attacks on the step-reduced RIPEMD-128 and RIPEMD-160 C Ohtahara, Y Sasaki, T Shimoyama IEICE Transactions on Fundamentals of Electronics, Communications and …, 2012 | 38 | 2012 |
Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014 | 37 | 2014 |
Extended key preparing apparatus, extended key preparing method, recording medium and computer program T Shimoyama, K Ito, M Takenaka, N Torii, J Yajima, H Yanami, ... US Patent 6,956,951, 2005 | 34 | 2005 |
Wang's sufficient conditions of MD5 are not sufficient J Yajima, T Shimoyama Cryptology ePrint Archive, 2005 | 34 | 2005 |
A Grobner Basis Method for Modules over Rings of Differential Operators T OAIKU, T Shimoyama J. Symbolic Computation 18, 223-248, 1994 | 34 | 1994 |
Encryption processing apparatus and method M Yasuda, T Shimoyama, J Kogure US Patent 9,100,185, 2015 | 33 | 2015 |
Correlation attack to the block cipher RC5 and the simplified variants of RC6 T Shimoyama, K Takeuchi, J Hayakawa Proceedings of the 3rd AES Conference (AES3), 2000 | 31 | 2000 |
Relational encryption for password verification R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ... US Patent 10,129,028, 2018 | 30 | 2018 |
Improved collision search for SHA-0 Y Naito, Y Sasaki, T Shimoyama, J Yajima, N Kunihiro, K Ohta Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 28 | 2006 |
How to construct sufficient condition in searching collisions of MD5 Y Sasaki, Y Naito, J Yajima, T Shimoyama, N Kunihiro, K Ohta Cryptology ePrint Archive, 2006 | 26 | 2006 |
Improving the higher order differential attack and cryptanalysis of the KN cipher T Shimoyama, S Moriai, T Kaneko International Workshop on Information Security, 32-42, 1997 | 26 | 1997 |