Jorge Nakahara Jr.

According to our database1, Jorge Nakahara Jr. authored at least 34 papers between 2000 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields.
IACR Cryptol. ePrint Arch., 2020

2015
Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages.
J. Satisf. Boolean Model. Comput., 2014

Differential entropy analysis of the IDEA block cipher.
J. Comput. Appl. Math., 2014

2013
Improving Block Cipher Design by Rearranging Internal Operations.
Proceedings of the SECRYPT 2013, 2013

Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis.
Proceedings of the SECRYPT 2013, 2013

2012
Key Management as a Service.
Proceedings of the SECRYPT 2012, 2012

Differential and Linear Attacks on the Full WIDEA-<i>n</i> Block Ciphers (under Weak Keys).
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher.
Proceedings of the Information Security Practice and Experience, 2011

2010
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Cryptanalysis of Reduced-Round MIBS Block Cipher.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
A New Involutory MDS Matrix for the AES.
Int. J. Netw. Secur., 2009

Analysis of Venkaiah et al.'s AES Design.
Int. J. Netw. Secur., 2009

On the Order of Round Components in the AES.
Int. J. Netw. Secur., 2009

Cryptanalysis of the Full MMB Block Cipher.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

A New Approach to <i>chi</i><sup>2</sup> Cryptanalysis of Block Ciphers.
Proceedings of the Information Security, 12th International Conference, 2009

Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2).
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Mini-ciphers: a reliable testbed for cryptanalysis?
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
3D: A Three-Dimensional Block Cipher.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Impossible-Differential Attacks on Large-Block Rijndael.
Proceedings of the Information Security, 10th International Conference, 2007

A Linear Analysis of Blowfish and Khufu.
Proceedings of the Information Security Practice and Experience, 2007

2005
New Multiset Attacks on Rijndael with Large Blocks.
Proceedings of the Progress in Cryptology, 2005

2004
Cryptanalysis of Ake98.
Proceedings of the Progress in Cryptology, 2004

Faster Variants of the MESH Block Ciphers.
Proceedings of the Progress in Cryptology, 2004

The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
The MESH Block Ciphers.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

2002
A note on Weak Keys of PES, IDEA and some Extended Variants.
IACR Cryptol. ePrint Arch., 2002

Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher.
IACR Cryptol. ePrint Arch., 2002

New Weak-Key Classes of IDEA.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers.
IACR Cryptol. ePrint Arch., 2001

Improved SQUARE Attacks against Reduced-Round HIEROCRYPT.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000


  Loading...