Author pages are created from data sourced from our academic publisher partnerships and public sources.

- Publications
- Influence

Linear Cryptanalysis Method for DES Cipher

- M. Matsui
- Computer Science
- EUROCRYPT
- 2 January 1994

We introduce a new method for cryptanalysis of DES cipher, which is essentially a known-plaintext attack. As a result, it is possible to break 8-round DES cipher with 221 known-plaintexts and… Expand

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis

- K. Aoki, Tetsuya Ichikawa, +4 authors T. Tokita
- Computer Science
- Selected Areas in Cryptography
- 14 August 2000

We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e., the same interface specifications as the Advanced Encryption… Expand

The First Experimental Cryptanalysis of the Data Encryption Standard

- M. Matsui
- Computer Science
- CRYPTO
- 21 August 1994

This paper describes an improved version of linear cryptanalysis and its application to the first, successful computer experiment in breaking the full 16-round DES. The scenario is a known-plaintext… Expand

New Block Encryption Algorithm MISTY

- M. Matsui
- Computer Science
- FSE
- 20 January 1997

We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY1 and MISTY2. They… Expand

Field test of quantum key distribution in the Tokyo QKD Network.

- M. Sasaki, M. Fujiwara, +43 authors A. Zeilinger
- Physics, Medicine
- Optics express
- 18 March 2011

A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type network. GHz-clocked QKD links enable us to… Expand

On Correlation Between the Order of S-boxes and the Strength of DES

- M. Matsui
- Computer Science
- EUROCRYPT
- 9 May 1994

This paper introduces a practical algorithm for deriving the best differential characteristic and the best linear expression of DES. Its principle is based on a duality between differential… Expand

A New Method for Known Plaintext Attack of FEAL Cipher

- M. Matsui, Atsuhiro Yamagishi
- Computer Science
- EUROCRYPT
- 24 May 1992

We propose a new known plaintext attack of FEAL cipher. Our method differs from previous statistical ones in point of deriving the extended key in definite way. As a result, it is possible to break… Expand

Key Collisions of the RC4 Stream Cipher

- M. Matsui
- Computer Science
- FSE
- 13 July 2009

This paper studies "colliding keys" of RC4 that create the same initial state and hence generate the same pseudo-random byte stream. It is easy to see that RC4 has colliding keys when its key size is… Expand

Speci cation of Camellia | a 128-bit Block Cipher

- K. Aoki, Tetsuya Ichikawa, +4 authors T. Tokita
- Mathematics
- 2001

2 Notations and Conventions 3 2.1 Radix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Notations . . . . . . . . . . . . . . . . . . . . . . . . . . . .… Expand

- 62
- 11

New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis

- M. Matsui
- Computer Science
- FSE
- 21 February 1996

We introduce a methodology for designing block ciphers with provable security against differential and linear cryptanalysis. It is based on three new principles: change of the location of round… Expand