Stop the war!
Остановите войну!
for scientists:
default search action
Yu Sasaki
Person information
- affiliation: NTT Social Informatics Laboratories, Tokyo, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c123]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. ACNS (1) 2024: 318-347 - [c122]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
The Exact Multi-user Security of 2-Key Triple DES. CT-RSA 2024: 112-135 - [c121]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation. EUROCRYPT (1) 2024: 97-127 - [i63]Christof Beierle, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Rachelle Heim Boissier:
Symmetric Cryptography (Dagstuhl Seminar 24041). Dagstuhl Reports 14(1): 72-89 (2024) - [i62]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Committing Wide Encryption Mode with Minimum Ciphertext Expansion. IACR Cryptol. ePrint Arch. 2024: 1257 (2024) - 2023
- [j51]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
MMM: Authenticated Encryption with Minimum Secret State for Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 80-109 (2023) - [j50]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode. IACR Trans. Symmetric Cryptol. 2023(4): 420-451 (2023) - [c120]Rin Watanabe, Mina Urata, Yu Sasaki, Fumiaki Saitoh:
Time Series Clustering of Product Categories Based on Purchase History and Consumer Characteristics. IEEM 2023: 1047-1051 - [c119]Yu Sasaki, Rin Watanabe, Takuma Shimizu, Yasukuni Hasegawa, Fumiaki Saitoh:
Visualization of Evaluation Viewpoints in Similar Customers by XAI Based on Review Evaluation Scores. IEEM 2023: 1052-1056 - [c118]Yukihito Hiraga, Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size. ISC 2023: 351-371 - 2022
- [c117]Yusuke Naito, Yu Sasaki, Takeshi Sugawara, Kan Yasuda:
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. CCS 2022: 2323-2336 - [c116]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. CRYPTO (3) 2022: 315-345 - [c115]Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda:
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. IWSEC 2022: 107-127 - [i61]Nils Gregor Leander, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Eran Lambooij:
Symmetric Cryptography (Dagstuhl Seminar 22141). Dagstuhl Reports 12(4): 1-12 (2022) - [i60]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. IACR Cryptol. ePrint Arch. 2022: 812 (2022) - 2021
- [j49]Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida:
Update on Analysis of Lesamnta-LW and New PRF Mode LRF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1304-1320 (2021) - [j48]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 298-333 (2021) - [c114]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Double-Block-Length Hash Function for Minimum Memory Size. ASIACRYPT (3) 2021: 376-406 - [c113]Raimu Isuzugawa, Kodai Toyoda, Yu Sasaki, Daiki Miyahara, Takaaki Mizuki:
A Card-Minimal Three-Input AND Protocol Using Two Shuffles. COCOON 2021: 668-679 - [c112]Akinori Hosoyamada, Yu Sasaki:
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. CRYPTO (1) 2021: 616-646 - [c111]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. INDOCRYPT 2021: 114-137 - [c110]Yosuke Todo, Yu Sasaki:
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. SAC 2021: 179-199 - [i59]Akinori Hosoyamada, Yu Sasaki:
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. IACR Cryptol. ePrint Arch. 2021: 292 (2021) - 2020
- [j47]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. J. Cryptol. 33(3): 910-916 (2020) - [j46]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Quantum algorithm for the multicollision problem. Theor. Comput. Sci. 842: 100-117 (2020) - [j45]Gaëtan Leurent, Yu Sasaki:
Preface to Volume 2020, Issue 1. IACR Trans. Symmetric Cryptol. 2020(1): 1-5 (2020) - [j44]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2020(3): 152-174 (2020) - [j43]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security. IACR Trans. Symmetric Cryptol. 2020(4): 1-38 (2020) - [j42]Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki:
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers. IACR Trans. Symmetric Cryptol. 2020(4): 147-172 (2020) - [j41]Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. IACR Trans. Symmetric Cryptol. 2020(S1): 31-59 (2020) - [j40]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [j39]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode. IACR Trans. Symmetric Cryptol. 2020(S1): 350-389 (2020) - [c109]Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida:
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode. ACNS (1) 2020: 89-109 - [c108]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c107]Akinori Hosoyamada, Yu Sasaki:
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound. EUROCRYPT (2) 2020: 249-279 - [c106]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. EUROCRYPT (2) 2020: 705-735 - [c105]Yu Sasaki, Noriaki Kamiyama, Yusheng Ji:
Designing Content Placement of CDN for Improving Aggregation Effect of ICN FIBs. ICOIN 2020: 130-135 - [c104]Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition. IWSEC 2020: 3-22 - [i58]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm. CoRR abs/2002.12439 (2020) - [i57]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i56]Akinori Hosoyamada, Yu Sasaki:
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound. IACR Cryptol. ePrint Arch. 2020: 213 (2020) - [i55]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. IACR Cryptol. ePrint Arch. 2020: 542 (2020) - [i54]Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition. IACR Cryptol. ePrint Arch. 2020: 680 (2020) - [i53]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i52]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1045 (2020) - [i51]Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki:
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers. IACR Cryptol. ePrint Arch. 2020: 1089 (2020)
2010 – 2019
- 2019
- [j38]Yu Sasaki, Kan Yasuda:
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 35-47 (2019) - [j37]Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda:
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes. J. Cryptol. 32(3): 895-940 (2019) - [j36]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32(4): 1383-1422 (2019) - [j35]Florian Mendel, Yu Sasaki:
Preface to Volume 2019, Issue 1. IACR Trans. Symmetric Cryptol. 2019(1): 1-4 (2019) - [j34]Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Trans. Symmetric Cryptol. 2019(1): 330-394 (2019) - [j33]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
INT-RUP Secure Lightweight Parallel AE Modes. IACR Trans. Symmetric Cryptol. 2019(4): 81-118 (2019) - [c103]Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. ACISP 2019: 555-572 - [c102]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. ACNS 2019: 43-63 - [c101]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm. ASIACRYPT (1) 2019: 552-583 - [c100]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS. CRYPTO (2) 2019: 180-209 - [c99]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. CT-RSA 2019: 293-312 - [c98]Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers. CT-RSA 2019: 391-411 - [c97]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Improved Quantum Multicollision-Finding Algorithm. PQCrypto 2019: 350-367 - [i50]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Quantum Algorithm for the Multicollision Problem. CoRR abs/1911.02822 (2019) - [i49]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. IACR Cryptol. ePrint Arch. 2019: 172 (2019) - [i48]Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Cryptol. ePrint Arch. 2019: 209 (2019) - [i47]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. IACR Cryptol. ePrint Arch. 2019: 289 (2019) - [i46]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. IACR Cryptol. ePrint Arch. 2019: 440 (2019) - [i45]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm. IACR Cryptol. ePrint Arch. 2019: 614 (2019) - [i44]Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. IACR Cryptol. ePrint Arch. 2019: 669 (2019) - [i43]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. IACR Cryptol. ePrint Arch. 2019: 867 (2019) - 2018
- [j32]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 88-98 (2018) - [j31]Yu Sasaki, Yosuke Todo:
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput. IEEE Trans. Computers 67(5): 717-732 (2018) - [c96]Yu Sasaki:
Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher. ACNS 2018: 421-439 - [c95]Yu Sasaki:
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC. AFRICACRYPT 2018: 87-106 - [c94]Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. ASIACRYPT (2) 2018: 35-64 - [c93]Akinori Hosoyamada, Yu Sasaki:
Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations. CT-RSA 2018: 198-218 - [c92]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. EUROCRYPT (2) 2018: 683-714 - [c91]Yu Sasaki:
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT. IWSEC 2018: 227-243 - [c90]Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang:
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. SAC 2018: 92-114 - [c89]Akinori Hosoyamada, Yu Sasaki:
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions. SCN 2018: 386-403 - [i42]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Improved Quantum Multicollision-Finding Algorithm. CoRR abs/1811.08097 (2018) - [i41]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. IACR Cryptol. ePrint Arch. 2018: 161 (2018) - [i40]Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. IACR Cryptol. ePrint Arch. 2018: 464 (2018) - [i39]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. IACR Cryptol. ePrint Arch. 2018: 793 (2018) - [i38]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Improved Quantum Multicollision-Finding Algorithm. IACR Cryptol. ePrint Arch. 2018: 1122 (2018) - [i37]Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers. IACR Cryptol. ePrint Arch. 2018: 1193 (2018) - 2017
- [j30]Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. IACR Trans. Symmetric Cryptol. 2017(2): 203-227 (2017) - [j29]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(3): 73-107 (2017) - [j28]Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. IACR Trans. Symmetric Cryptol. 2017(4): 99-129 (2017) - [c88]Akinori Hosoyamada, Yu Sasaki, Keita Xagawa:
Quantum Multicollision-Finding Algorithm. ASIACRYPT (2) 2017: 179-210 - [c87]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [c86]Yu Sasaki, Yosuke Todo:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers. EUROCRYPT (3) 2017: 185-215 - [c85]Yu Sasaki, Kan Yasuda:
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. ISPEC 2017: 217-236 - [c84]Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Rate-One AE with Security Under RUP. ISC 2017: 3-20 - [c83]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. IWSEC 2017: 141-158 - [c82]Yu Sasaki, Yosuke Todo:
New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search. SECITC 2017: 150-165 - [i36]Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Message-Recovery MACs and Verification-Unskippable AE. IACR Cryptol. ePrint Arch. 2017: 260 (2017) - [i35]Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. IACR Cryptol. ePrint Arch. 2017: 478 (2017) - [i34]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - [i33]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 693 (2017) - [i32]Akinori Hosoyamada, Yu Sasaki, Keita Xagawa:
Quantum Multicollision-Finding Algorithm. IACR Cryptol. ePrint Arch. 2017: 864 (2017) - [i31]Akinori Hosoyamada, Yu Sasaki:
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations. IACR Cryptol. ePrint Arch. 2017: 977 (2017) - [i30]Akinori Hosoyamada, Yu Sasaki:
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions. IACR Cryptol. ePrint Arch. 2017: 1229 (2017) - 2016
- [j27]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Extended meet-in-the-middle attacks on some Feistel constructions. Des. Codes Cryptogr. 80(3): 587-618 (2016) - [j26]Yu Sasaki, Lei Wang:
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 22-30 (2016) - [j25]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Forgeries and Distinguishers against PAES. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 39-48 (2016) - [j24]Yu Sasaki, Lei Wang:
Message Extension Attack against Authenticated Encryptions: Application to PANDA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 49-57 (2016) - [j23]Jian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Trans. Symmetric Cryptol. 2016(1): 33-56 (2016) - [j22]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Trans. Symmetric Cryptol. 2016(2): 307-337 (2016) - [c81]Nasour Bagheri, Florian Mendel, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP (2) 2016: 301-316 - [c80]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. ACNS 2016: 518-536 - [c79]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33 - [c78]Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. ASIACRYPT (1) 2016: 627-647 - [c77]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c76]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. FSE 2016: 554-574 - [c75]Yu Sasaki, Yosuke Todo:
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. SAC 2016: 264-283 - [i29]Ivica Nikolic, Yu Sasaki:
Refinements of the k-tree Algorithm for the Generalized Birthday Problem. IACR Cryptol. ePrint Arch. 2016: 312 (2016) - [i28]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. IACR Cryptol. ePrint Arch. 2016: 436 (2016) - [i27]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IACR Cryptol. ePrint Arch. 2016: 625 (2016) - [i26]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - [i25]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptol. ePrint Arch. 2016: 732 (2016) - [i24]Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. IACR Cryptol. ePrint Arch. 2016: 851 (2016) - [i23]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Cryptol. ePrint Arch. 2016: 973 (2016) - [i22]