Maki Shigeri

According to our database1, Maki Shigeri authored at least 14 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Parallel Verification of Serial MAC and AE Modes.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Security of Related-Key Differential Attacks on TWINE, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

2019
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.
Proceedings of the Advances in Information and Computer Security, 2019

2011
On Maximum Differential Probability of Generalized Feistel.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Higher Order Differential Attack on 6-Round MISTY1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
Higher Order Differential Attacks on Reduced-Round MISTY1.
Proceedings of the Information Security and Cryptology, 2008

Impossible Differential Cryptanalysis of CLEFIA.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

2006
Improving cache attacks by considering cipher structure.
Int. J. Inf. Sec., 2006

2005
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Trans. Inf. Theory, 2005

2003
Cryptanalysis of DES Implemented on Computers with Cache.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003


  Loading...