• Publications
  • Influence
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e., the same interface specifications as the Advanced EncryptionExpand
  • 407
  • 48
On the Power of Bitslice Implementation on Intel Core2 Processor
This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel's new microprocessor Core2, particularly concentrating on "bitslice implementation". The bitsliceExpand
  • 91
  • 6
A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer
Recently the study and implementation of elliptic curve cryptosystems (ECC) have developed rapidly and its achievements have become a center of attraction. ECC has the advantage of high-speedExpand
  • 57
  • 4
A Description of the Camellia Encryption Algorithm
This document describes the Camellia encryption algorithm. Camellia is a block cipher with 128-bit block size and 128-, 192-, and 256-bit keys. The algorithm description is presented together withExpand
  • 34
  • 4
Performance Analysis and Parallel Implementation of Dedicated Hash Functions
This paper shows an extensive software performance analysis of dedicated hash functions, particularly concentrating on Pentium III, which is a current dominant processor. The targeted hash functionsExpand
  • 54
  • 1
Fecal ammonia, urea, volatile fatty acid and lactate levels in dairy cows and their pathophysiological significance during diarrhea
Normal fecal samples were taken from lactating cows fed either a total mixed ration (TMR; n = 30) or pasture-based diet (20) and from dry cows fed mainly on hay (15). Diarrheic fecal samples (n = 51)Expand
  • 14
  • 1
Fast Software Implementations of MISTY1 on Alpha Processors (Special Section on Cryptography and Information Security)
In this paper, we show two methods for fast software implementations of block cipher algorithm MISTY1 on Digital Alpha processors. One is based on the method proposed by Biham at the fourth FastExpand
  • 13
  • 1
Cataract surgery training using pig eyes filled with chestnuts of various hardness.
This method uses pig eyes filled with cooked chestnuts serving as pseudonuclei with the goal of teaching dividing techniques of phacoemulsification and aspiration. The pseudonuclei simulate theExpand
  • 18
Expression of protein gene product 9.5 in the anterior lens epithelial cells of atopic cataracts
Purpose: To investigate the mechanisms of atopic cataract by immunohistochemically observing protein gene product 9.5 in lens epithelial cells (LECs) of atopic cataracts. Setting: Departments ofExpand
  • 7