default search action
Mitsuru Matsui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j8]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020)
2010 – 2019
- 2019
- [e5]Mitsuru Matsui:
Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings. Lecture Notes in Computer Science 11405, Springer 2019, ISBN 978-3-030-12611-7 [contents] - [i3]Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. IACR Cryptol. ePrint Arch. 2019: 700 (2019) - 2018
- [j7]Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 192-217 (2018) - 2014
- [c19]Mitsuru Matsui, Yumiko Murakami:
AES Smaller Than S-Box - Minimalism in Software Design on Low End Microcontrollers. LightSec 2014: 51-66 - 2013
- [c18]Mitsuru Matsui, Yumiko Murakami:
Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller. FSE 2013: 393-409
2000 – 2009
- 2009
- [c17]Mitsuru Matsui:
Key Collisions of the RC4 Stream Cipher. FSE 2009: 38-50 - [e4]Mitsuru Matsui:
Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. Lecture Notes in Computer Science 5912, Springer 2009, ISBN 978-3-642-10365-0 [contents] - 2008
- [j6]Mitsuru Matsui:
Special Section on Cryptography and Information Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 1-2 (2008) - 2007
- [c16]Mitsuru Matsui, Junko Nakajima:
On the Power of Bitslice Implementation on Intel Core2 Processor. CHES 2007: 121-134 - 2006
- [j5]Mitsuru Matsui, Sayaka Fukuda:
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 2-10 (2006) - [c15]Mitsuru Matsui:
How Far Can We Go on the x64 Processors? FSE 2006: 341-358 - [e3]Louis Goubin, Mitsuru Matsui:
Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings. Lecture Notes in Computer Science 4249, Springer 2006, ISBN 3-540-46559-6 [contents] - 2005
- [c14]Mitsuru Matsui, Sayaka Fukuda:
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. FSE 2005: 398-412 - 2004
- [e2]Mitsuru Matsui, Robert J. Zuccherato:
Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers. Lecture Notes in Computer Science 3006, Springer 2004, ISBN 3-540-21370-8 [contents] - [i2]Mitsuru Matsui, Junko Nakajima, Shiho Moriai:
A Description of the Camellia Encryption Algorithm. RFC 3713: 1-15 (2004) - 2003
- [j4]Toshio Tokita, Mitsuru Matsui:
Linear Cryptanalysis of Block Cipher Xenon. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 13-18 (2003) - [j3]Junko Nakajima, Mitsuru Matsui:
Performance Analysis and Parallel Implementation of Dedicated Hash Functions on Pentium III. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 54-63 (2003) - 2002
- [j2]Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:
The 128-Bit Block Cipher Camellia. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 11-24 (2002) - [j1]Toshio Hasegawa, Tsuyoshi Nishioka, Hirokazu Ishizuka, Jun-ichi Abe, Katsuhiro Shimizu, Mitsuru Matsui, Shigeki Takeuchi:
An Experimental Realization of Quantum Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 149-157 (2002) - [c13]Junko Nakajima, Mitsuru Matsui:
Performance Analysis and Parallel Implementation of Dedicated Hash Functions. EUROCRYPT 2002: 165-180 - [e1]Mitsuru Matsui:
Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers. Lecture Notes in Computer Science 2355, Springer 2002, ISBN 3-540-43869-6 [contents] - 2000
- [c12]Tetsuya Ichikawa, Tomomi Kasuya, Mitsuru Matsui:
Hardware Evaluation of the AES Finalists. AES Candidate Conference 2000: 279-285 - [c11]Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Selected Areas in Cryptography 2000: 39-56 - [i1]Hidenori Ohta, Mitsuru Matsui:
A Description of the MISTY1 Encryption Algorithm. RFC 2994: 1-10 (2000)
1990 – 1999
- 1999
- [c10]Mitsuru Matsui, Toshio Tokita:
Cryptanalysis of a Reduced Version of the Block Cipher E2. FSE 1999: 71-80 - 1998
- [c9]Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui:
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. Public Key Cryptography 1998: 182-194 - 1997
- [c8]Mitsuru Matsui:
New Block Encryption Algorithm MISTY. FSE 1997: 54-68 - 1996
- [c7]Mitsuru Matsui:
New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. FSE 1996: 205-218 - 1994
- [c6]Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui:
Linear Cryptanalysis of LOKI and s2DES. ASIACRYPT 1994: 293-303 - [c5]Mitsuru Matsui:
The First Experimental Cryptanalysis of the Data Encryption Standard. CRYPTO 1994: 1-11 - [c4]Mitsuru Matsui:
On Correlation Between the Order of S-boxes and the Strength of DES. EUROCRYPT 1994: 366-375 - 1993
- [c3]Kazuo Ohta, Mitsuru Matsui:
Differential Attack on Message Authentication Codes. CRYPTO 1993: 200-211 - [c2]Mitsuru Matsui:
Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 1993: 386-397 - 1992
- [c1]Mitsuru Matsui, Atsuhiro Yamagishi:
A New Method for Known Plaintext Attack of FEAL Cipher. EUROCRYPT 1992: 81-91
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint