BibTeX records: Yu Sasaki

download as .bib file

@article{DBLP:journals/dcc/GuoJNS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Extended meet-in-the-middle attacks on some Feistel constructions},
  journal   = {Des. Codes Cryptography},
  volume    = {80},
  number    = {3},
  pages     = {587--618},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/s10623-015-0120-4},
  doi       = {10.1007/s10623-015-0120-4},
  timestamp = {Fri, 24 Jun 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dcc/GuoJNS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki016,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Generic Internal State Recovery on Strengthened {HMAC:} \emph{n}-bit
               Secure {HMAC} Requires Key in All Blocks},
  journal   = {{IEICE} Transactions},
  volume    = {99-A},
  number    = {1},
  pages     = {22--30},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-a_1_22},
  timestamp = {Mon, 11 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/JeanNS016,
  author    = {J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki and
               Lei Wang},
  title     = {Practical Forgeries and Distinguishers against {PAES}},
  journal   = {{IEICE} Transactions},
  volume    = {99-A},
  number    = {1},
  pages     = {39--48},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-a_1_39},
  timestamp = {Mon, 11 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/JeanNS016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki016a,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Message Extension Attack against Authenticated Encryptions: Application
               to {PANDA}},
  journal   = {{IEICE} Transactions},
  volume    = {99-A},
  number    = {1},
  pages     = {49--57},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-a_1_49},
  timestamp = {Mon, 11 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki016a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNQSS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Kexin Qiao and
               Yu Sasaki and
               Siang Meng Sim},
  title     = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
               for S-box Designs},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2016},
  number    = {1},
  pages     = {33--56},
  year      = {2016},
  url       = {http://tosc.iacr.org/index.php/ToSC/article/view/534},
  timestamp = {Wed, 25 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tosc/GuoJNQSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
               Feistel Constructions},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2016},
  number    = {2},
  pages     = {307--337},
  year      = {2016},
  url       = {http://tosc.iacr.org/index.php/ToSC/article/view/576},
  timestamp = {Wed, 22 Mar 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tosc/GuoJNS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BagheriMS16,
  author    = {Nasour Bagheri and
               Florian Mendel and
               Yu Sasaki},
  title     = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate
               {PAEQ}},
  booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  pages     = {301--316},
  year      = {2016},
  crossref  = {DBLP:conf/acisp/2016-2},
  url       = {http://dx.doi.org/10.1007/978-3-319-40367-0_19},
  doi       = {10.1007/978-3-319-40367-0_19},
  timestamp = {Fri, 08 Jul 2016 11:27:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/BagheriMS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/KondoSI16,
  author    = {Kota Kondo and
               Yu Sasaki and
               Tetsu Iwata},
  title     = {On the Design Rationale of Simon Block Cipher: Integral Attacks and
               Impossible Differential Attacks against Simon Variants},
  booktitle = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  pages     = {518--536},
  year      = {2016},
  crossref  = {DBLP:conf/acns/2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-39555-5_28},
  doi       = {10.1007/978-3-319-39555-5_28},
  timestamp = {Thu, 09 Jun 2016 15:05:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/KondoSI16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/TodoLS16,
  author    = {Yosuke Todo and
               Gregor Leander and
               Yu Sasaki},
  title     = {Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,
               and Midori64},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  pages     = {3--33},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-2},
  url       = {http://dx.doi.org/10.1007/978-3-662-53890-6_1},
  doi       = {10.1007/978-3-662-53890-6_1},
  timestamp = {Mon, 14 Nov 2016 14:58:45 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/TodoLS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NikolicS16,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {A New Algorithm for the Unbalanced Meet-in-the-Middle Problem},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  pages     = {627--647},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-1},
  url       = {http://dx.doi.org/10.1007/978-3-662-53887-6_23},
  doi       = {10.1007/978-3-662-53887-6_23},
  timestamp = {Mon, 14 Nov 2016 14:57:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/NikolicS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleJKL0PSSS16,
  author    = {Christof Beierle and
               J{\'{e}}r{\'{e}}my Jean and
               Stefan K{\"{o}}lbl and
               Gregor Leander and
               Amir Moradi and
               Thomas Peyrin and
               Yu Sasaki and
               Pascal Sasdrich and
               Siang Meng Sim},
  title     = {The {SKINNY} Family of Block Ciphers and Its Low-Latency Variant {MANTIS}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  pages     = {123--153},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-2},
  url       = {http://dx.doi.org/10.1007/978-3-662-53008-5_5},
  doi       = {10.1007/978-3-662-53008-5_5},
  timestamp = {Wed, 27 Jul 2016 12:45:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BeierleJKL0PSSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/BagheriHJMS16,
  author    = {Nasour Bagheri and
               Tao Huang and
               Keting Jia and
               Florian Mendel and
               Yu Sasaki},
  title     = {Cryptanalysis of Reduced {NORX}},
  booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  pages     = {554--574},
  year      = {2016},
  crossref  = {DBLP:conf/fse/2016},
  url       = {http://dx.doi.org/10.1007/978-3-662-52993-5_28},
  doi       = {10.1007/978-3-662-52993-5_28},
  timestamp = {Wed, 27 Jul 2016 12:57:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/BagheriHJMS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NikolicS16,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {Refinements of the k-tree Algorithm for the Generalized Birthday Problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {312},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/312},
  timestamp = {Thu, 14 Apr 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/NikolicS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BagheriHJMS16,
  author    = {Nasour Bagheri and
               Tao Huang and
               Keting Jia and
               Florian Mendel and
               Yu Sasaki},
  title     = {Cryptanalysis of Reduced {NORX}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {436},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/436},
  timestamp = {Wed, 11 May 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BagheriHJMS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KondoSI16,
  author    = {Kota Kondo and
               Yu Sasaki and
               Tetsu Iwata},
  title     = {On the Design Rationale of {SIMON} Block Cipher: Integral Attacks
               and Impossible Differential Attacks against {SIMON} Variants},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {625},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/625},
  timestamp = {Fri, 29 Jul 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/KondoSI16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BeierleJKL0PSSS16,
  author    = {Christof Beierle and
               J{\'{e}}r{\'{e}}my Jean and
               Stefan K{\"{o}}lbl and
               Gregor Leander and
               Amir Moradi and
               Thomas Peyrin and
               Yu Sasaki and
               Pascal Sasdrich and
               Siang Meng Sim},
  title     = {The {SKINNY} Family of Block Ciphers and its Low-Latency Variant {MANTIS}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {660},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/660},
  timestamp = {Fri, 29 Jul 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BeierleJKL0PSSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/TodoLS16,
  author    = {Yosuke Todo and
               Gregor Leander and
               Yu Sasaki},
  title     = {Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM,
               and Midori64},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {732},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/732},
  timestamp = {Fri, 12 Aug 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/TodoLS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NikolicS16a,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {A New Algorithm for the Unbalanced Meet-in-the-Middle Problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {851},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/851},
  timestamp = {Fri, 14 Oct 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/NikolicS16a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001JNSS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki and
               Siang Meng Sim},
  title     = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
               for S-box Designs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {973},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/973},
  timestamp = {Wed, 09 Nov 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/0001JNSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GuoJNS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
               Feistel Constructions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1162},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1162},
  timestamp = {Tue, 24 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GuoJNS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiT16,
  author    = {Yu Sasaki and
               Yosuke Todo},
  title     = {New Impossible Differential Search Tool from Design and Cryptanalysis
               Aspects},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1181},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1181},
  timestamp = {Tue, 24 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SasakiT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/daglib/0036974,
  author    = {Kazuo Sakiyama and
               Yu Sasaki and
               Yang Li},
  title     = {Security of Block Ciphers - From Algorithm Design to Hardware Implementation},
  publisher = {Wiley},
  year      = {2015},
  url       = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118660013.html},
  isbn      = {978-1-118-66001-0},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/books/daglib/0036974},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWW15,
  author    = {Yu Sasaki and
               Gaoli Wang and
               Lei Wang},
  title     = {Improved Single-Key Distinguisher on {HMAC-MD5} and Key Recovery Attacks
               on Sandwich-MAC-MD5 and {MD5-MAC}},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {26--38},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_26},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiW15,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Bitwise Partial-Sum: {A} New Tool for Integral Analysis against {ARX}
               Designs},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {49--60},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_49},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki15,
  author    = {Yu Sasaki},
  title     = {Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last
               Network Twist},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {61--71},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_61},
  timestamp = {Tue, 19 May 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NikolicS15,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {Refinements of the k-tree Algorithm for the Generalized Birthday Problem},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {683--703},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {http://dx.doi.org/10.1007/978-3-662-48800-3_28},
  doi       = {10.1007/978-3-662-48800-3_28},
  timestamp = {Fri, 27 Nov 2015 10:51:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/NikolicS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiY15,
  author    = {Yu Sasaki and
               Kan Yasuda},
  title     = {How to Incorporate Associated Data in Sponge-Based Authenticated Encryption},
  booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  pages     = {353--370},
  year      = {2015},
  crossref  = {DBLP:conf/ctrsa/2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-16715-2_19},
  doi       = {10.1007/978-3-319-16715-2_19},
  timestamp = {Thu, 07 May 2015 18:00:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/SasakiY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SasakiY15,
  author    = {Yu Sasaki and
               Kan Yasuda},
  title     = {A New Mode of Operation for Incremental Authenticated Encryption with
               Associated Data},
  booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  pages     = {397--416},
  year      = {2015},
  crossref  = {DBLP:conf/sacrypt/2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-31301-6_23},
  doi       = {10.1007/978-3-319-31301-6_23},
  timestamp = {Mon, 21 Mar 2016 13:22:02 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/SasakiY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanS015,
  author    = {J{\'{e}}r{\'{e}}my Jean and
               Yu Sasaki and
               Lei Wang},
  title     = {Analysis of the {CAESAR} Candidate Silver},
  booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  pages     = {493--509},
  year      = {2015},
  crossref  = {DBLP:conf/sacrypt/2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-31301-6_28},
  doi       = {10.1007/978-3-319-31301-6_28},
  timestamp = {Mon, 21 Mar 2016 13:22:02 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/JeanS015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001SWWW15,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Meiqin Wang and
               Long Wen},
  title     = {Equivalent Key Recovery Attacks against {HMAC} and {NMAC} with Whirlpool
               Reduced to 7 Rounds},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {75},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/075},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/0001SWWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001SWW15,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Shuang Wu},
  title     = {Cryptanalysis of HMAC/NMAC-Whirlpool},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {149},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/149},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/0001SWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001JNQSS15,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Kexin Qiao and
               Yu Sasaki and
               Siang Meng Sim},
  title     = {Invariant Subspace Attack Against Full Midori64},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1189},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1189},
  timestamp = {Tue, 12 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/0001JNQSS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Comprehensive Study of Integral Analysis on LBlock},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {1},
  pages     = {127--138},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a_1_127},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki14a,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses on a Merkle-Damg{\aa}rd Based {MAC} - Almost Universal
               Forgery and Distinguishing-\emph{H} Attacks},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {1},
  pages     = {167--176},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a_1_167},
  timestamp = {Thu, 15 May 2014 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiW14a,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Distinguishers on Double-Branch Compression Function and Applications
               to Round-Reduced {RIPEMD-128} and {RIPEMD-160}},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {1},
  pages     = {177--190},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a_1_177},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiW14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/Sasaki14,
  author    = {Yu Sasaki},
  title     = {Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results
               and Applications},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {253--270},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-07536-5_16},
  doi       = {10.1007/978-3-319-07536-5_16},
  timestamp = {Fri, 06 Jun 2014 09:41:24 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/Sasaki14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001JNS14,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks on Generic Feistel Constructions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  pages     = {458--477},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014-1},
  url       = {http://dx.doi.org/10.1007/978-3-662-45611-8_24},
  doi       = {10.1007/978-3-662-45611-8_24},
  timestamp = {Mon, 10 Nov 2014 13:41:59 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/0001JNS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cans/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Message Extension Attack against Authenticated Encryptions: Application
               to {PANDA}},
  booktitle = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  pages     = {82--97},
  year      = {2014},
  crossref  = {DBLP:conf/cans/2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-12280-9_6},
  doi       = {10.1007/978-3-319-12280-9_6},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cans/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001PSW14,
  author    = {Jian Guo and
               Thomas Peyrin and
               Yu Sasaki and
               Lei Wang},
  title     = {Updates on Generic Attacks against {HMAC} and {NMAC}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {131--148},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {http://dx.doi.org/10.1007/978-3-662-44371-2_8},
  doi       = {10.1007/978-3-662-44371-2_8},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/0001PSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiTWIO14,
  author    = {Yu Sasaki and
               Yuuki Tokushige and
               Lei Wang and
               Mitsugu Iwamoto and
               Kazuo Ohta},
  title     = {An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers
               and Proposals of ShiftBytes Parameters for Gr{\o}stl},
  booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
               the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
               2014. Proceedings},
  pages     = {424--443},
  year      = {2014},
  crossref  = {DBLP:conf/ctrsa/2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-04852-9_22},
  doi       = {10.1007/978-3-319-04852-9_22},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/SasakiTWIO14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001SWWW14,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Meiqin Wang and
               Long Wen},
  title     = {Equivalent Key Recovery Attacks Against {HMAC} and {NMAC} with Whirlpool
               Reduced to 7 Rounds},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  pages     = {571--590},
  year      = {2014},
  crossref  = {DBLP:conf/fse/2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-46706-0_29},
  doi       = {10.1007/978-3-662-46706-0_29},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/0001SWWW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangLVSRT14,
  author    = {Qingju Wang and
               Zhiqiang Liu and
               Kerem Varici and
               Yu Sasaki and
               Vincent Rijmen and
               Yosuke Todo},
  title     = {Cryptanalysis of Reduced-Round {SIMON32} and {SIMON48}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  pages     = {143--160},
  year      = {2014},
  crossref  = {DBLP:conf/indocrypt/2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-13039-2_9},
  doi       = {10.1007/978-3-319-13039-2_9},
  timestamp = {Mon, 03 Nov 2014 13:28:59 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/WangLVSRT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanNSW14,
  author    = {J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki and
               Lei Wang},
  title     = {Practical Cryptanalysis of {PAES}},
  booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
               Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  pages     = {228--242},
  year      = {2014},
  crossref  = {DBLP:conf/sacrypt/2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-13051-4_14},
  doi       = {10.1007/978-3-319-13051-4_14},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/JeanNSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/scn/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Generic Attacks on Strengthened {HMAC:} n-bit Secure {HMAC} Requires
               Key in All Blocks},
  booktitle = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  pages     = {324--339},
  year      = {2014},
  crossref  = {DBLP:conf/scn/2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-10879-7_19},
  doi       = {10.1007/978-3-319-10879-7_19},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/scn/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {A Forgery Attack against PANDA-s},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {217},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/217},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiW14a,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {A Practical Universal Forgery Attack against {PAES-8}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {218},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/218},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SasakiW14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/WangLVSRT14,
  author    = {Qingju Wang and
               Zhiqiang Liu and
               Kerem Varici and
               Yu Sasaki and
               Vincent Rijmen and
               Yosuke Todo},
  title     = {Cryptanalysis of Reduced-round {SIMON32} and {SIMON48}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {761},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/761},
  timestamp = {Wed, 15 Oct 2014 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/WangLVSRT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki13,
  author    = {Yu Sasaki},
  title     = {Meet-in-the-Middle Preimage Attacks on {AES} Hashing Modes and an
               Application to Whirlpool},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {1},
  pages     = {121--130},
  year      = {2013},
  url       = {http://search.ieice.org/bin/summary.php?id=e96-a_1_121},
  timestamp = {Tue, 29 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki13a,
  author    = {Yu Sasaki},
  title     = {Boomerang Distinguishers on MD4-Based Hash Functions: First Practical
               Results on Full 5-Pass {HAVAL} Compression Function},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {1},
  pages     = {131--140},
  year      = {2013},
  url       = {http://search.ieice.org/bin/summary.php?id=e96-a_1_131},
  timestamp = {Tue, 29 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki13a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiA13,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {1},
  pages     = {141--149},
  year      = {2013},
  url       = {http://search.ieice.org/bin/summary.php?id=e96-a_1_141},
  timestamp = {Tue, 29 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiA13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IsobeSC13,
  author    = {Takanori Isobe and
               Yu Sasaki and
               Jiageng Chen},
  title     = {Related-Key Boomerang Attacks on {KATAN32/48/64}},
  booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  pages     = {268--285},
  year      = {2013},
  crossref  = {DBLP:conf/acisp/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-39059-3_19},
  doi       = {10.1007/978-3-642-39059-3_19},
  timestamp = {Mon, 17 Jun 2013 13:10:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/IsobeSC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/Sasaki13,
  author    = {Yu Sasaki},
  title     = {Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last
               Network Twist},
  booktitle = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  pages     = {170--185},
  year      = {2013},
  crossref  = {DBLP:conf/acns/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-38980-1_11},
  doi       = {10.1007/978-3-642-38980-1_11},
  timestamp = {Tue, 25 Jun 2013 10:53:48 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/Sasaki13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001SWW13,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Shuang Wu},
  title     = {Cryptanalysis of HMAC/NMAC-Whirlpool},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {21--40},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {http://dx.doi.org/10.1007/978-3-642-42045-0_2},
  doi       = {10.1007/978-3-642-42045-0_2},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/0001SWW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/IwamotoPS13,
  author    = {Mitsugu Iwamoto and
               Thomas Peyrin and
               Yu Sasaki},
  title     = {Limited-Birthday Distinguishers for Hash Functions - Collisions beyond
               the Birthday Bound Can Be Meaningful},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {504--523},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {http://dx.doi.org/10.1007/978-3-642-42045-0_26},
  doi       = {10.1007/978-3-642-42045-0_26},
  timestamp = {Thu, 12 Dec 2013 14:51:37 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/IwamotoPS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/SasakiLSS13,
  author    = {Yu Sasaki and
               Yang Li and
               Hikaru Sakamoto and
               Kazuo Sakiyama},
  title     = {Coupon Collector's Problem for Fault Analysis against {AES} - High
               Tolerance for Noisy Fault Injections},
  booktitle = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  pages     = {213--220},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-39884-1_18},
  doi       = {10.1007/978-3-642-39884-1_18},
  timestamp = {Wed, 21 Aug 2013 20:04:48 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/SasakiLSS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiW13,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Bitwise Partial-Sum on {HIGHT:} {A} New Tool for Integral Analysis
               Against {ARX} Designs},
  booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  pages     = {189--202},
  year      = {2013},
  crossref  = {DBLP:conf/icisc/2013},
  url       = {http://dx.doi.org/10.1007/978-3-319-12160-4_12},
  doi       = {10.1007/978-3-319-12160-4_12},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/SasakiW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NaitoSWY13,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Lei Wang and
               Kan Yasuda},
  title     = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}},
  booktitle = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  pages     = {83--98},
  year      = {2013},
  crossref  = {DBLP:conf/iwsec/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-41383-4_6},
  doi       = {10.1007/978-3-642-41383-4_6},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/NaitoSWY13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TodoS13,
  author    = {Yosuke Todo and
               Yu Sasaki},
  title     = {New Property of Diffusion Switching Mechanism on {CLEFIA} and Its
               Application to {DFA}},
  booktitle = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  pages     = {99--114},
  year      = {2013},
  crossref  = {DBLP:conf/iwsec/2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-41383-4_7},
  doi       = {10.1007/978-3-642-41383-4_7},
  timestamp = {Tue, 10 Dec 2013 15:22:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/TodoS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SasakiW13,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Improved Single-Key Distinguisher on {HMAC-MD5} and Key Recovery Attacks
               on Sandwich-MAC-MD5},
  booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  pages     = {493--512},
  year      = {2013},
  crossref  = {DBLP:conf/sacrypt/2013},
  url       = {http://dx.doi.org/10.1007/978-3-662-43414-7_25},
  doi       = {10.1007/978-3-662-43414-7_25},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/SasakiW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13,
  author    = {Yu Sasaki and
               Wataru Komatsubara and
               Yasuhide Sakai and
               Lei Wang and
               Mitsugu Iwamoto and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5}
               and {HAVAL}},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {111--122},
  year      = {2013},
  crossref  = {DBLP:conf/secrypt/2013},
  url       = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=7223160},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/SasakiKSWISO13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/IwamotoPS13,
  author    = {Mitsugu Iwamoto and
               Thomas Peyrin and
               Yu Sasaki},
  title     = {Limited-birthday Distinguishers for Hash Functions - Collisions Beyond
               the Birthday Bound can be Meaningful},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {611},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/611},
  timestamp = {Sun, 20 Oct 2013 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/IwamotoPS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki12,
  author    = {Yu Sasaki},
  title     = {Known-Key Attacks on Rijndael with Large Blocks and Strengthening
               ShiftRow Parameter},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {21--28},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_21},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/WangSKSO12,
  author    = {Lei Wang and
               Yu Sasaki and
               Wataru Komatsubara and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch
               Hash Functions {RIPEMD} and {RIPEMD-128}},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {100--110},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_100},
  timestamp = {Sat, 14 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/WangSKSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiMA12,
  author    = {Yu Sasaki and
               Florian Mendel and
               Kazumaro Aoki},
  title     = {Preimage Attacks against PKC98-Hash and {HAS-V}},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {111--124},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_111},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiMA12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/OhtaharaSS12,
  author    = {Chiaki Ohtahara and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on the Step-Reduced {RIPEMD-128} and {RIPEMD-160}},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {10},
  pages     = {1729--1739},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_10_1729},
  timestamp = {Mon, 26 Nov 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/OhtaharaSS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiEHK12,
  author    = {Yu Sasaki and
               Sareh Emami and
               Deukjo Hong and
               Ashish Kumar},
  title     = {Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application
               to Camellia},
  booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
               2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  pages     = {87--100},
  year      = {2012},
  crossref  = {DBLP:conf/acisp/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-31448-3_7},
  doi       = {10.1007/978-3-642-31448-3_7},
  timestamp = {Sun, 08 Jul 2012 14:34:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/SasakiEHK12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Distinguishers beyond Three Rounds of the {RIPEMD-128/-160} Compression
               Functions},
  booktitle = {Applied Cryptography and Network Security - 10th International Conference,
               {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  pages     = {275--292},
  year      = {2012},
  crossref  = {DBLP:conf/acns/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-31284-7_17},
  doi       = {10.1007/978-3-642-31284-7_17},
  timestamp = {Fri, 15 Jun 2012 20:22:23 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWSSO12,
  author    = {Yu Sasaki and
               Lei Wang and
               Yasuhide Sakai and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Three-Subset Meet-in-the-Middle Attack on Reduced {XTEA}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  pages     = {138--154},
  year      = {2012},
  crossref  = {DBLP:conf/africacrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-31410-0_9},
  doi       = {10.1007/978-3-642-31410-0_9},
  timestamp = {Fri, 22 Jun 2012 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/SasakiWSSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiWWW12,
  author    = {Yu Sasaki and
               Lei Wang and
               Shuang Wu and
               Wenling Wu},
  title     = {Investigating Fundamental Security Requirements on Whirlpool: Improved
               Preimage and Collision Attacks},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {562--579},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34961-4_34},
  doi       = {10.1007/978-3-642-34961-4_34},
  timestamp = {Wed, 21 Nov 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/SasakiWWW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PeyrinSW12,
  author    = {Thomas Peyrin and
               Yu Sasaki and
               Lei Wang},
  title     = {Generic Related-Key Attacks for {HMAC}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {580--597},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34961-4_35},
  doi       = {10.1007/978-3-642-34961-4_35},
  timestamp = {Wed, 21 Nov 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/PeyrinSW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Sasaki12,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses on a Merkle-Damg{\aa}rd Based {MAC} - Almost Universal
               Forgery and Distinguishing-H Attacks},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  pages     = {411--427},
  year      = {2012},
  crossref  = {DBLP:conf/eurocrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-29011-4_25},
  doi       = {10.1007/978-3-642-29011-4_25},
  timestamp = {Mon, 18 Jan 2016 17:00:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Sasaki12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Comprehensive Study of Integral Analysis on 22-Round LBlock},
  booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  pages     = {156--169},
  year      = {2012},
  crossref  = {DBLP:conf/icisc/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-37682-5_12},
  doi       = {10.1007/978-3-642-37682-5_12},
  timestamp = {Sat, 06 Apr 2013 17:48:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KoyamaSK12,
  author    = {Takuma Koyama and
               Yu Sasaki and
               Noboru Kunihiro},
  title     = {Multi-differential Cryptanalysis on Reduced {DM-PRESENT-80:} Collisions
               and Other Differential Properties},
  booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  pages     = {352--367},
  year      = {2012},
  crossref  = {DBLP:conf/icisc/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-37682-5_25},
  doi       = {10.1007/978-3-642-37682-5_25},
  timestamp = {Sat, 06 Apr 2013 17:48:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/KoyamaSK12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NakasoneLSIOS12,
  author    = {Toshiki Nakasone and
               Yang Li and
               Yu Sasaki and
               Mitsugu Iwamoto and
               Kazuo Ohta and
               Kazuo Sakiyama},
  title     = {Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision
               Distinguisher},
  booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  pages     = {395--409},
  year      = {2012},
  crossref  = {DBLP:conf/icisc/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-37682-5_28},
  doi       = {10.1007/978-3-642-37682-5_28},
  timestamp = {Sat, 06 Apr 2013 17:48:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/NakasoneLSIOS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Sasaki12,
  author    = {Yu Sasaki},
  title     = {Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers
               with Several Rounds},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  pages     = {265--282},
  year      = {2012},
  crossref  = {DBLP:conf/indocrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34931-7_16},
  doi       = {10.1007/978-3-642-34931-7_16},
  timestamp = {Mon, 18 Feb 2013 12:36:21 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/Sasaki12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KoyamaWSSO12,
  author    = {Takuma Koyama and
               Lei Wang and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {New Truncated Differential Cryptanalysis on 3D Block Cipher},
  booktitle = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  pages     = {109--125},
  year      = {2012},
  crossref  = {DBLP:conf/ispec/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-29101-2_8},
  doi       = {10.1007/978-3-642-29101-2_8},
  timestamp = {Tue, 17 Apr 2012 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ispec/KoyamaWSSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12,
  author    = {Yu Sasaki and
               Lei Wang and
               Yasuhiro Takasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Boomerang Distinguishers for Full {HAS-160} Compression Function},
  booktitle = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  pages     = {156--169},
  year      = {2012},
  crossref  = {DBLP:conf/iwsec/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34117-5_10},
  doi       = {10.1007/978-3-642-34117-5_10},
  timestamp = {Mon, 05 Nov 2012 13:27:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/Sasaki0TSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/0007SSO12,
  author    = {Lei Wang and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash
               Function},
  booktitle = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  pages     = {170--181},
  year      = {2012},
  crossref  = {DBLP:conf/iwsec/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34117-5_11},
  doi       = {10.1007/978-3-642-34117-5_11},
  timestamp = {Mon, 05 Nov 2012 13:27:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/0007SSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Meet-in-the-Middle Technique for Integral Attacks against Feistel
               Ciphers},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  pages     = {234--251},
  year      = {2012},
  crossref  = {DBLP:conf/sacrypt/2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-35999-6_16},
  doi       = {10.1007/978-3-642-35999-6_16},
  timestamp = {Mon, 04 Feb 2013 15:09:51 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {2-Dimension Sums: Distinguishers Beyond Three Rounds of {RIPEMD-128}
               and {RIPEMD-160}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {49},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/049},
  timestamp = {Tue, 08 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/PeyrinS012,
  author    = {Thomas Peyrin and
               Yu Sasaki and
               Lei Wang},
  title     = {Generic Related-key Attacks for {HMAC}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {684},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/684},
  timestamp = {Tue, 08 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/PeyrinS012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/WangS11,
  author    = {Lei Wang and
               Yu Sasaki},
  title     = {Preimage Attack on 23-Step Tiger},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {1},
  pages     = {110--120},
  year      = {2011},
  url       = {http://search.ieice.org/bin/summary.php?id=e94-a_1_110},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/WangS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses of Double-Mix Merkle-Damg{\aa}rd Mode in the Original
               Version of {AURORA-512}},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {1},
  pages     = {121--128},
  year      = {2011},
  url       = {http://search.ieice.org/bin/summary.php?id=e94-a_1_121},
  timestamp = {Wed, 12 Jan 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OhtaharaOSS11,
  author    = {Chiaki Ohtahara and
               Keita Okada and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on Full-ARIRANG (Poster)},
  booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  pages     = {417--422},
  year      = {2011},
  crossref  = {DBLP:conf/acisp/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-22497-3_28},
  doi       = {10.1007/978-3-642-22497-3_28},
  timestamp = {Mon, 11 Jul 2011 15:16:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/OhtaharaOSS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Collisions of {MMO-MD5} and Their Impact on Original {MD5}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
               on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  pages     = {117--133},
  year      = {2011},
  crossref  = {DBLP:conf/africacrypt/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-21969-6_8},
  doi       = {10.1007/978-3-642-21969-6_8},
  timestamp = {Tue, 05 Jul 2011 12:24:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangSKOS11,
  author    = {Lei Wang and
               Yu Sasaki and
               Wataru Komatsubara and
               Kazuo Ohta and
               Kazuo Sakiyama},
  title     = {(Second) Preimage Attacks on Step-Reduced {RIPEMD/RIPEMD-128} with
               a New Local-Collision Approach},
  booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
               the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
               2011. Proceedings},
  pages     = {197--212},
  year      = {2011},
  crossref  = {DBLP:conf/ctrsa/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-19074-2_14},
  doi       = {10.1007/978-3-642-19074-2_14},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/WangSKOS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Meet-in-the-Middle Preimage Attacks on {AES} Hashing Modes and an
               Application to Whirlpool},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {378--396},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-21702-9_22},
  doi       = {10.1007/978-3-642-21702-9_22},
  timestamp = {Mon, 27 Jun 2011 17:01:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiY11,
  author    = {Yu Sasaki and
               Kan Yasuda},
  title     = {Known-Key Distinguishers on 11-Round Feistel and Collision Attacks
               on Its Hashing Modes},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {397--415},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-21702-9_23},
  doi       = {10.1007/978-3-642-21702-9_23},
  timestamp = {Mon, 27 Jun 2011 17:01:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/SasakiY11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiA11,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Improved Integral Analysis on Tweaked Lesamnta},
  booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  pages     = {1--17},
  year      = {2011},
  crossref  = {DBLP:conf/icisc/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-31912-9_1},
  doi       = {10.1007/978-3-642-31912-9_1},
  timestamp = {Wed, 18 Jul 2012 14:44:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/SasakiA11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SasakiTSO11,
  author    = {Yu Sasaki and
               Naoyuki Takayanagi and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Experimental Verification of Super-Sbox Analysis - Confirmation of
               Detailed Attack Complexity},
  booktitle = {Advances in Information and Computer Security - 6th International
               Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  pages     = {178--192},
  year      = {2011},
  crossref  = {DBLP:conf/iwsec/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25141-2_12},
  doi       = {10.1007/978-3-642-25141-2_12},
  timestamp = {Mon, 24 Oct 2011 14:44:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/SasakiTSO11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Boomerang Distinguishers on MD4-Family: First Practical Results on
               Full 5-Pass {HAVAL}},
  booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  pages     = {1--18},
  year      = {2011},
  crossref  = {DBLP:conf/sacrypt/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-28496-0_1},
  doi       = {10.1007/978-3-642-28496-0_1},
  timestamp = {Thu, 23 Feb 2012 18:09:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AokiRSS11,
  author    = {Kazumaro Aoki and
               G{\"{u}}nther Roland and
               Yu Sasaki and
               Martin Schl{\"{a}}ffer},
  title     = {Byte Slicing Gr{\o}stl - Optimized Intel {AES-NI} and 8-bit Implementations
               of the {SHA-3} Finalist Gr{\o}stl},
  booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
               and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  pages     = {124--133},
  year      = {2011},
  crossref  = {DBLP:conf/secrypt/2011},
  timestamp = {Thu, 27 Oct 2011 10:35:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/AokiRSS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhtaharaOSS11,
  author    = {Chiaki Ohtahara and
               Keita Okada and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle
               Feed-Forward},
  booktitle = {Information Security Applications - 12th International Workshop, {WISA}
               2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  pages     = {40--54},
  year      = {2011},
  crossref  = {DBLP:conf/wisa/2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-27890-7_4},
  doi       = {10.1007/978-3-642-27890-7_4},
  timestamp = {Tue, 28 Feb 2012 14:21:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wisa/OhtaharaOSS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOAK10,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Kazumaro Aoki and
               Noboru Kunihiro},
  title     = {Practical Password Recovery Attacks on {MD4} Based Prefix and Hybrid
               Authentication Protocols},
  journal   = {{IEICE} Transactions},
  volume    = {93-A},
  number    = {1},
  pages     = {84--92},
  year      = {2010},
  url       = {http://search.ieice.org/bin/summary.php?id=e93-a_1_84},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiWOAK10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/WangOSSK10,
  author    = {Lei Wang and
               Kazuo Ohta and
               Yu Sasaki and
               Kazuo Sakiyama and
               Noboru Kunihiro},
  title     = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and
               {NMAC}},
  journal   = {{IEICE} Transactions},
  volume    = {93-D},
  number    = {5},
  pages     = {1087--1095},
  year      = {2010},
  url       = {http://search.ieice.org/bin/summary.php?id=e93-d_5_1087},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/WangOSSK10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiLWSO10,
  author    = {Yu Sasaki and
               Yang Li and
               Lei Wang and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Non-full-active Super-Sbox Analysis: Applications to {ECHO} and Gr{\o}stl},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  pages     = {38--55},
  year      = {2010},
  crossref  = {DBLP:conf/asiacrypt/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-17373-8_3},
  doi       = {10.1007/978-3-642-17373-8_3},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/SasakiLWSO10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cisc/OhtaharaSS10,
  author    = {Chiaki Ohtahara and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on Step-Reduced {RIPEMD-128} and {RIPEMD-160}},
  booktitle = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  pages     = {169--186},
  year      = {2010},
  crossref  = {DBLP:conf/cisc/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-21518-6_13},
  doi       = {10.1007/978-3-642-21518-6_13},
  timestamp = {Tue, 16 Aug 2011 13:08:51 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cisc/OhtaharaSS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangS10,
  author    = {Lei Wang and
               Yu Sasaki},
  title     = {Finding Preimages of Tiger Up to 23 Steps},
  booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  pages     = {116--133},
  year      = {2010},
  crossref  = {DBLP:conf/fse/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-13858-4_7},
  doi       = {10.1007/978-3-642-13858-4_7},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/WangS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiMA10,
  author    = {Yu Sasaki and
               Florian Mendel and
               Kazumaro Aoki},
  title     = {Preimage Attacks against PKC98-Hash and {HAS-V}},
  booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International
               Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  pages     = {68--91},
  year      = {2010},
  crossref  = {DBLP:conf/icisc/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-24209-0_5},
  doi       = {10.1007/978-3-642-24209-0_5},
  timestamp = {Fri, 09 Sep 2011 12:26:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/SasakiMA10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki10,
  author    = {Yu Sasaki},
  title     = {Known-Key Attacks on Rijndael with Large Blocks and Strengthening
               \emph{ShiftRow} Parameter},
  booktitle = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  pages     = {301--315},
  year      = {2010},
  crossref  = {DBLP:conf/iwsec/2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-16825-3_20},
  doi       = {10.1007/978-3-642-16825-3_20},
  timestamp = {Wed, 10 Nov 2010 11:10:23 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/Sasaki10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GomisawaLTFSSO10,
  author    = {Shigeto Gomisawa and
               Yang Li and
               Junko Takahashi and
               Toshinori Fukunaga and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Efficient Differential Fault Analysis for {AES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {336},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/336},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/GomisawaLTFSSO10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/YajimaINSSPKO09,
  author    = {Jun Yajima and
               Terutoshi Iwasaki and
               Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Thomas Peyrin and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision
               Search},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {1},
  pages     = {87--95},
  year      = {2009},
  url       = {http://search.ieice.org/bin/summary.php?id=e92-a_1_87&category=A&year=2009&lang=E&abst=},
  timestamp = {Thu, 30 Jul 2009 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/YajimaINSSPKO09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOK09,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {1},
  pages     = {96--104},
  year      = {2009},
  url       = {http://search.ieice.org/bin/summary.php?id=e92-a_1_96&category=A&year=2009&lang=E&abst=},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiWOK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiA09,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions:
               Application to {RIPEMD} and Others},
  booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  pages     = {214--231},
  year      = {2009},
  crossref  = {DBLP:conf/acisp/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-02620-1_15},
  doi       = {10.1007/978-3-642-02620-1_15},
  timestamp = {Wed, 24 Jun 2009 11:57:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/SasakiA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MatusiewiczNNSS09,
  author    = {Krystian Matusiewicz and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Ivica Nikolic and
               Yu Sasaki and
               Martin Schl{\"{a}}ffer},
  title     = {Rebound Attack on the Full Lane Compression Function},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {106--125},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-10366-7_7},
  doi       = {10.1007/978-3-642-10366-7_7},
  timestamp = {Mon, 07 Dec 2009 19:04:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/MatusiewiczNNSS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AokiGMSW09,
  author    = {Kazumaro Aoki and
               Jian Guo and
               Krystian Matusiewicz and
               Yu Sasaki and
               Lei Wang},
  title     = {Preimages for Step-Reduced {SHA-2}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {578--597},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-10366-7_34},
  doi       = {10.1007/978-3-642-10366-7_34},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/AokiGMSW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AokiS09,
  author    = {Kazumaro Aoki and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Preimage Attacks Against Reduced {SHA-0} and {SHA-1}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  pages     = {70--89},
  year      = {2009},
  crossref  = {DBLP:conf/crypto/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-03356-8_5},
  doi       = {10.1007/978-3-642-03356-8_5},
  timestamp = {Wed, 07 Oct 2009 16:59:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/AokiS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SasakiA09,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Finding Preimages in Full {MD5} Faster Than Exhaustive Search},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {134--152},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-01001-9_8},
  doi       = {10.1007/978-3-642-01001-9_8},
  timestamp = {Thu, 23 Apr 2009 15:05:49 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/SasakiA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HongKS09,
  author    = {Deukjo Hong and
               Bonwook Koo and
               Yu Sasaki},
  title     = {Improved Preimage Attack for 68-Step {HAS-160}},
  booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International
               Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  pages     = {332--348},
  year      = {2009},
  crossref  = {DBLP:conf/icisc/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-14423-3_22},
  doi       = {10.1007/978-3-642-14423-3_22},
  timestamp = {Tue, 08 Dec 2015 10:44:41 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/HongKS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/Sasaki09,
  author    = {Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass {HAVAL}},
  booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  pages     = {79--94},
  year      = {2009},
  crossref  = {DBLP:conf/isw/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-04474-8_7},
  doi       = {10.1007/978-3-642-04474-8_7},
  timestamp = {Mon, 12 Oct 2009 14:09:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/Sasaki09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangSSO09,
  author    = {Lei Wang and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Bit-Free Collision: Application to {APOP} Attack},
  booktitle = {Advances in Information and Computer Security, 4th International Workshop
               on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  pages     = {3--21},
  year      = {2009},
  crossref  = {DBLP:conf/iwsec/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-04846-3_2},
  doi       = {10.1007/978-3-642-04846-3_2},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/WangSSO09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Sasaki09,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses of Narrow-Pipe Mode of Operation in {AURORA-512} Hash
               Function},
  booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop,
               {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
               Selected Papers},
  pages     = {36--52},
  year      = {2009},
  crossref  = {DBLP:conf/sacrypt/2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-05445-7_3},
  doi       = {10.1007/978-3-642-05445-7_3},
  timestamp = {Thu, 05 Nov 2009 14:39:58 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/Sasaki09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki09,
  author    = {Yu Sasaki},
  title     = {A Collision Attack on {AURORA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {106},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/106},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Sasaki09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki09a,
  author    = {Yu Sasaki},
  title     = {A 2nd-Preimage Attack on {AURORA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {112},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/112},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Sasaki09a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki09b,
  author    = {Yu Sasaki},
  title     = {A Full Key Recovery Attack on {HMAC-AURORA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {125},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/125},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Sasaki09b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MatusiewiczNNSS09,
  author    = {Krystian Matusiewicz and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Ivica Nikolic and
               Yu Sasaki and
               Martin Schl{\"{a}}ffer},
  title     = {Rebound Attack on the Full {LANE} Compression Function},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {443},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/443},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/MatusiewiczNNSS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiWA09,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazumaro Aoki},
  title     = {Preimage Attacks on 41-Step {SHA-256} and 46-Step {SHA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {479},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/479},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SasakiWA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWKO08,
  author    = {Yu Sasaki and
               Lei Wang and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {New Message Differences for Collision Attacks on {MD4} and {MD5}},
  journal   = {{IEICE} Transactions},
  volume    = {91-A},
  number    = {1},
  pages     = {55--63},
  year      = {2008},
  url       = {http://dx.doi.org/10.1093/ietfec/e91-a.1.55},
  doi       = {10.1093/ietfec/e91-a.1.55},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiWKO08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiA08,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Preimage Attacks on Step-Reduced {MD5}},
  booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
               2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  pages     = {282--296},
  year      = {2008},
  crossref  = {DBLP:conf/acisp/2008},
  url       = {http://dx.doi.org/10.1007/978-3-540-70500-0_21},
  doi       = {10.1007/978-3-540-70500-0_21},
  timestamp = {Thu, 03 Jul 2008 14:33:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/SasakiA08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWOK08,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {Password Recovery on Challenge and Response: Impossible Differential
               Attack on Hash Function},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  pages     = {290--307},
  year      = {2008},
  crossref  = {DBLP:conf/africacrypt/2008},
  url       = {http://dx.doi.org/10.1007/978-3-540-68164-9_20},
  doi       = {10.1007/978-3-540-68164-9_20},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/SasakiWOK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiA08,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Preimage Attacks on 3, 4, and 5-Pass {HAVAL}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  pages     = {253--271},
  year      = {2008},
  crossref  = {DBLP:conf/asiacrypt/2008},
  url       = {http://dx.doi.org/10.1007/978-3-540-89255-7_16},
  doi       = {10.1007/978-3-540-89255-7_16},
  timestamp = {Thu, 04 Dec 2008 21:35:54 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/SasakiA08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08,
  author    = {Jun Yajima and
               Terutoshi Iwasaki and
               Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {A strict evaluation method on the number of conditions for the {SHA-1}
               collision search},
  booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  pages     = {10--20},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008asia},
  url       = {http://doi.acm.org/10.1145/1368310.1368316},
  doi       = {10.1145/1368310.1368316},
  timestamp = {Thu, 15 May 2008 12:56:34 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/YajimaINSSKO08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiWOK08,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {Security of {MD5} Challenge and Response: Extension of {APOP} Password
               Recovery Attack},
  booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
               the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
               Proceedings},
  pages     = {1--18},
  year      = {2008},
  crossref  = {DBLP:conf/ctrsa/2008},
  url       = {http://dx.doi.org/10.1007/978-3-540-79263-5_1},
  doi       = {10.1007/978-3-540-79263-5_1},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/SasakiWOK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiA08,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {A Preimage Attack for 52-Step {HAS-160}},
  booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  pages     = {302--317},
  year      = {2008},
  crossref  = {DBLP:conf/icisc/2008},
  url       = {http://dx.doi.org/10.1007/978-3-642-00730-9_19},
  doi       = {10.1007/978-3-642-00730-9_19},
  timestamp = {Fri, 20 Mar 2009 10:20:36 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/SasakiA08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AokiS08,
  author    = {Kazumaro Aoki and
               Yu Sasaki},
  title     = {Preimage Attacks on One-Block MD4, 63-Step {MD5} and More},
  booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  pages     = {103--119},
  year      = {2008},
  crossref  = {DBLP:conf/sacrypt/2008},
  url       = {http://dx.doi.org/10.1007/978-3-642-04159-4_7},
  doi       = {10.1007/978-3-642-04159-4_7},
  timestamp = {Wed, 16 Dec 2009 09:41:13 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/AokiS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiNKO07,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attacks on {MD4} and {MD5}},
  journal   = {{IEICE} Transactions},
  volume    = {90-A},
  number    = {1},
  pages     = {36--47},
  year      = {2007},
  url       = {http://dx.doi.org/10.1093/ietfec/e90-a.1.36},
  doi       = {10.1093/ietfec/e90-a.1.36},
  timestamp = {Tue, 15 Jan 2008 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieicet/SasakiNKO07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07,
  author    = {Jun Yajima and
               Yu Sasaki and
               Yusuke Naito and
               Terutoshi Iwasaki and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {A New Strategy for Finding a Differential Path of {SHA-1}},
  booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  pages     = {45--58},
  year      = {2007},
  crossref  = {DBLP:conf/acisp/2007},
  url       = {http://dx.doi.org/10.1007/978-3-540-73458-1_4},
  doi       = {10.1007/978-3-540-73458-1_4},
  timestamp = {Thu, 05 Jul 2007 15:04:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/YajimaSNISKO07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiWOK07,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {New Message Difference for {MD4}},
  booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  pages     = {329--348},
  year      = {2007},
  crossref  = {DBLP:conf/fse/2007},
  url       = {http://dx.doi.org/10.1007/978-3-540-74619-5_21},
  doi       = {10.1007/978-3-540-74619-5_21},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/SasakiWOK07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiYA07,
  author    = {Yu Sasaki and
               Go Yamamoto and
               Kazumaro Aoki},
  title     = {Practical Password Recovery on an {MD5} Challenge and Response},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {101},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/101},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SasakiYA07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Jun Yajima and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Search for {SHA-0}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  pages     = {21--36},
  year      = {2006},
  crossref  = {DBLP:conf/asiacrypt/2006},
  url       = {http://dx.doi.org/10.1007/11935230_2},
  doi       = {10.1007/11935230_2},
  timestamp = {Mon, 20 Nov 2006 14:23:27 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/NaitoSSYKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Jun Yajima and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {How to Construct Sufficient Conditions for Hash Functions},
  booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  pages     = {243--259},
  year      = {2006},
  crossref  = {DBLP:conf/vietcrypt/2006},
  url       = {http://dx.doi.org/10.1007/11958239_16},
  doi       = {10.1007/11958239_16},
  timestamp = {Fri, 06 Mar 2015 14:11:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/vietcrypt/SasakiNYSKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSSYKO06,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Jun Yajima and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Message Modification for Step 21-23 on {SHA-0}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {16},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/016},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/NaitoSSYKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNYSKO06,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Jun Yajima and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {How to Construct Sufficient Condition in Searching Collisions of {MD5}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {74},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/074},
  timestamp = {Mon, 05 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SasakiNYSKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NaitoSKO05,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attack on {MD4} with Probability Almost 1},
  booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  pages     = {129--145},
  year      = {2005},
  crossref  = {DBLP:conf/icisc/2005},
  url       = {http://dx.doi.org/10.1007/11734727_12},
  doi       = {10.1007/11734727_12},
  timestamp = {Mon, 21 Aug 2006 14:37:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/NaitoSKO05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSKO05,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attack on {MD4}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {151},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/151},
  timestamp = {Mon, 16 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/NaitoSKO05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNKO05,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attack on {MD5}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {400},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/400},
  timestamp = {Mon, 16 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/SasakiNKO05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-2,
  editor    = {Joseph K. Liu and
               Ron Steinfeld},
  title     = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9723},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-40367-0},
  doi       = {10.1007/978-3-319-40367-0},
  isbn      = {978-3-319-40366-3},
  timestamp = {Fri, 08 Jul 2016 11:27:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor    = {Mark Manulis and
               Ahmad{-}Reza Sadeghi and
               Steve Schneider},
  title     = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9696},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-39555-5},
  doi       = {10.1007/978-3-319-39555-5},
  isbn      = {978-3-319-39554-8},
  timestamp = {Thu, 09 Jun 2016 15:05:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-2,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10032},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-662-53890-6},
  doi       = {10.1007/978-3-662-53890-6},
  isbn      = {978-3-662-53889-0},
  timestamp = {Mon, 14 Nov 2016 14:58:45 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-1,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10031},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-662-53887-6},
  doi       = {10.1007/978-3-662-53887-6},
  isbn      = {978-3-662-53886-9},
  timestamp = {Mon, 14 Nov 2016 14:57:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9815},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-662-53008-5},
  doi       = {10.1007/978-3-662-53008-5},
  isbn      = {978-3-662-53007-8},
  timestamp = {Wed, 27 Jul 2016 12:45:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2016,
  editor    = {Thomas Peyrin},
  title     = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9783},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-662-52993-5},
  doi       = {10.1007/978-3-662-52993-5},
  isbn      = {978-3-662-52992-8},
  timestamp = {Wed, 27 Jul 2016 12:57:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 27 Nov 2015 10:51:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2015,
  editor    = {Kaisa Nyberg},
  title     = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9048},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-319-16715-2},
  doi       = {10.1007/978-3-319-16715-2},
  isbn      = {978-3-319-16714-5},
  timestamp = {Thu, 07 May 2015 18:00:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2015,
  editor    = {Orr Dunkelman and
               Liam Keliher},
  title     = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9566},
  publisher = {Springer},
  year      = {2016},
  url       = {http://dx.doi.org/10.1007/978-3-319-31301-6},
  doi       = {10.1007/978-3-319-31301-6},
  isbn      = {978-3-319-31300-9},
  timestamp = {Mon, 21 Mar 2016 13:22:02 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2014,
  editor    = {Ioana Boureanu and
               Philippe Owesarski and
               Serge Vaudenay},
  title     = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8479},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-07536-5},
  doi       = {10.1007/978-3-319-07536-5},
  isbn      = {978-3-319-07535-8},
  timestamp = {Fri, 06 Jun 2014 09:41:24 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014-1,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-45611-8},
  doi       = {10.1007/978-3-662-45611-8},
  isbn      = {978-3-662-45610-1},
  timestamp = {Mon, 10 Nov 2014 13:41:59 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cans/2014,
  editor    = {Dimitris Gritzalis and
               Aggelos Kiayias and
               Ioannis G. Askoxylakis},
  title     = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8813},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-12280-9},
  doi       = {10.1007/978-3-319-12280-9},
  isbn      = {978-3-319-12279-3},
  timestamp = {Fri, 17 Oct 2014 12:56:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cans/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Tue, 15 Jul 2014 12:33:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2014,
  editor    = {Josh Benaloh},
  title     = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
               the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
               2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8366},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-04852-9},
  doi       = {10.1007/978-3-319-04852-9},
  isbn      = {978-3-319-04851-2},
  timestamp = {Wed, 19 Feb 2014 14:10:55 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  publisher = {Springer},
  year      = {2015},
  url       = {http://dx.doi.org/10.1007/978-3-662-46706-0},
  doi       = {10.1007/978-3-662-46706-0},
  isbn      = {978-3-662-46705-3},
  timestamp = {Wed, 22 Apr 2015 15:40:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2014,
  editor    = {Willi Meier and
               Debdeep Mukhopadhyay},
  title     = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8885},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-13039-2},
  doi       = {10.1007/978-3-319-13039-2},
  isbn      = {978-3-319-13038-5},
  timestamp = {Mon, 03 Nov 2014 13:28:59 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2014,
  editor    = {Antoine Joux and
               Amr M. Youssef},
  title     = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
               Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8781},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-13051-4},
  doi       = {10.1007/978-3-319-13051-4},
  isbn      = {978-3-319-13050-7},
  timestamp = {Thu, 04 Dec 2014 15:20:23 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/scn/2014,
  editor    = {Michel Abdalla and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8642},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-10879-7},
  doi       = {10.1007/978-3-319-10879-7},
  isbn      = {978-3-319-10878-0},
  timestamp = {Tue, 16 Sep 2014 11:14:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/scn/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2013,
  editor    = {Colin Boyd and
               Leonie Simpson},
  title     = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7959},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-39059-3},
  doi       = {10.1007/978-3-642-39059-3},
  isbn      = {978-3-642-39058-6},
  timestamp = {Mon, 17 Jun 2013 13:10:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2013,
  editor    = {Michael J. Jacobson Jr. and
               Michael E. Locasto and
               Payman Mohassel and
               Reihaneh Safavi{-}Naini},
  title     = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7954},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-38980-1},
  doi       = {10.1007/978-3-642-38980-1},
  isbn      = {978-3-642-38979-5},
  timestamp = {Tue, 25 Jun 2013 10:53:48 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-2,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8270},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-42045-0},
  doi       = {10.1007/978-3-642-42045-0},
  isbn      = {978-3-642-42044-3},
  timestamp = {Thu, 12 Dec 2013 14:51:37 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2013-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2013,
  editor    = {Ahmad{-}Reza Sadeghi},
  title     = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7859},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-39884-1},
  doi       = {10.1007/978-3-642-39884-1},
  isbn      = {978-3-642-39883-4},
  timestamp = {Wed, 21 Aug 2013 20:04:48 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2013,
  editor    = {Hyang{-}Sook Lee and
               Dong{-}Guk Han},
  title     = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8565},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-319-12160-4},
  doi       = {10.1007/978-3-319-12160-4},
  isbn      = {978-3-319-12159-8},
  timestamp = {Wed, 22 Oct 2014 16:55:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2013,
  editor    = {Kazuo Sakiyama and
               Masayuki Terada},
  title     = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8231},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-41383-4},
  doi       = {10.1007/978-3-642-41383-4},
  isbn      = {978-3-642-41382-7},
  timestamp = {Tue, 10 Dec 2013 15:22:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2013,
  editor    = {Tanja Lange and
               Kristin E. Lauter and
               Petr Lisonek},
  title     = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8282},
  publisher = {Springer},
  year      = {2014},
  url       = {http://dx.doi.org/10.1007/978-3-662-43414-7},
  doi       = {10.1007/978-3-662-43414-7},
  isbn      = {978-3-662-43413-0},
  timestamp = {Thu, 28 Aug 2014 14:01:36 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor    = {Pierangela Samarati},
  title     = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  publisher = {SciTePress},
  year      = {2013},
  isbn      = {978-989-8565-73-0},
  timestamp = {Tue, 05 Nov 2013 12:35:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2012,
  editor    = {Willy Susilo and
               Yi Mu and
               Jennifer Seberry},
  title     = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
               2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7372},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-31448-3},
  doi       = {10.1007/978-3-642-31448-3},
  isbn      = {978-3-642-31447-6},
  timestamp = {Sun, 08 Jul 2012 14:34:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2012,
  editor    = {Feng Bao and
               Pierangela Samarati and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security - 10th International Conference,
               {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7341},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-31284-7},
  doi       = {10.1007/978-3-642-31284-7},
  isbn      = {978-3-642-31283-0},
  timestamp = {Fri, 15 Jun 2012 20:22:23 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2012,
  editor    = {Aikaterini Mitrokotsa and
               Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7374},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-31410-0},
  doi       = {10.1007/978-3-642-31410-0},
  isbn      = {978-3-642-31409-4},
  timestamp = {Thu, 21 Jun 2012 14:43:17 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Tue, 20 Nov 2012 14:20:19 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor    = {David Pointcheval and
               Thomas Johansson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7237},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-29011-4},
  doi       = {10.1007/978-3-642-29011-4},
  isbn      = {978-3-642-29010-7},
  timestamp = {Mon, 18 Jan 2016 17:00:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2012,
  editor    = {Taekyoung Kwon and
               Mun{-}Kyu Lee and
               Daesung Kwon},
  title     = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7839},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-37682-5},
  doi       = {10.1007/978-3-642-37682-5},
  isbn      = {978-3-642-37681-8},
  timestamp = {Sat, 06 Apr 2013 17:48:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2012,
  editor    = {Steven D. Galbraith and
               Mridul Nandi},
  title     = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7668},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34931-7},
  doi       = {10.1007/978-3-642-34931-7},
  isbn      = {978-3-642-34930-0},
  timestamp = {Mon, 18 Feb 2013 12:36:21 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor    = {Mark Dermot Ryan and
               Ben Smyth and
               Guilin Wang},
  title     = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7232},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-29101-2},
  doi       = {10.1007/978-3-642-29101-2},
  isbn      = {978-3-642-29100-5},
  timestamp = {Mon, 16 Apr 2012 08:55:54 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ispec/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2012,
  editor    = {Goichiro Hanaoka and
               Toshihiro Yamauchi},
  title     = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7631},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-34117-5},
  doi       = {10.1007/978-3-642-34117-5},
  isbn      = {978-3-642-34116-8},
  timestamp = {Mon, 05 Nov 2012 13:27:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2012,
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  publisher = {Springer},
  year      = {2013},
  url       = {http://dx.doi.org/10.1007/978-3-642-35999-6},
  doi       = {10.1007/978-3-642-35999-6},
  isbn      = {978-3-642-35998-9},
  timestamp = {Mon, 04 Feb 2013 15:09:51 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2011,
  editor    = {Udaya Parampalli and
               Philip Hawkes},
  title     = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6812},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-22497-3},
  doi       = {10.1007/978-3-642-22497-3},
  isbn      = {978-3-642-22496-6},
  timestamp = {Mon, 11 Jul 2011 15:16:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2011,
  editor    = {Abderrahmane Nitaj and
               David Pointcheval},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
               on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6737},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-21969-6},
  doi       = {10.1007/978-3-642-21969-6},
  isbn      = {978-3-642-21968-9},
  timestamp = {Tue, 05 Jul 2011 12:24:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2011,
  editor    = {Aggelos Kiayias},
  title     = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
               the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
               2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6558},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-19074-2},
  doi       = {10.1007/978-3-642-19074-2},
  isbn      = {978-3-642-19073-5},
  timestamp = {Tue, 15 Feb 2011 14:34:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2011,
  editor    = {Antoine Joux},
  title     = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6733},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-21702-9},
  doi       = {10.1007/978-3-642-21702-9},
  isbn      = {978-3-642-21701-2},
  timestamp = {Mon, 27 Jun 2011 17:01:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2011,
  editor    = {Howon Kim},
  title     = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7259},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-31912-9},
  doi       = {10.1007/978-3-642-31912-9},
  isbn      = {978-3-642-31911-2},
  timestamp = {Wed, 18 Jul 2012 14:44:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2011,
  editor    = {Tetsu Iwata and
               Masakatsu Nishigaki},
  title     = {Advances in Information and Computer Security - 6th International
               Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7038},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-25141-2},
  doi       = {10.1007/978-3-642-25141-2},
  isbn      = {978-3-642-25140-5},
  timestamp = {Mon, 24 Oct 2011 14:44:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2011,
  editor    = {Ali Miri and
               Serge Vaudenay},
  title     = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7118},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-28496-0},
  doi       = {10.1007/978-3-642-28496-0},
  isbn      = {978-3-642-28495-3},
  timestamp = {Thu, 23 Feb 2012 18:09:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2011,
  editor    = {Javier Lopez and
               Pierangela Samarati},
  title     = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
               and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {SciTePress},
  year      = {2011},
  isbn      = {978-989-8425-71-3},
  timestamp = {Thu, 27 Oct 2011 10:35:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/secrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wisa/2011,
  editor    = {Souhwan Jung and
               Moti Yung},
  title     = {Information Security Applications - 12th International Workshop, {WISA}
               2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7115},
  publisher = {Springer},
  year      = {2012},
  url       = {http://dx.doi.org/10.1007/978-3-642-27890-7},
  doi       = {10.1007/978-3-642-27890-7},
  isbn      = {978-3-642-27889-1},
  timestamp = {Tue, 28 Feb 2012 14:21:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wisa/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2010,
  editor    = {Masayuki Abe},
  title     = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6477},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-17373-8},
  doi       = {10.1007/978-3-642-17373-8},
  isbn      = {978-3-642-17372-1},
  timestamp = {Wed, 08 Dec 2010 10:25:48 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor    = {Xuejia Lai and
               Moti Yung and
               Dongdai Lin},
  title     = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6584},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-21518-6},
  doi       = {10.1007/978-3-642-21518-6},
  isbn      = {978-3-642-21517-9},
  timestamp = {Tue, 16 Aug 2011 13:08:51 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cisc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2010,
  editor    = {Seokhie Hong and
               Tetsu Iwata},
  title     = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6147},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-13858-4},
  doi       = {10.1007/978-3-642-13858-4},
  isbn      = {978-3-642-13857-7},
  timestamp = {Tue, 29 Jun 2010 11:04:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2010,
  editor    = {Kyung Hyune Rhee and
               DaeHun Nyang},
  title     = {Information Security and Cryptology - {ICISC} 2010 - 13th International
               Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6829},
  publisher = {Springer},
  year      = {2011},
  url       = {http://dx.doi.org/10.1007/978-3-642-24209-0},
  doi       = {10.1007/978-3-642-24209-0},
  isbn      = {978-3-642-24208-3},
  timestamp = {Fri, 09 Sep 2011 12:26:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor    = {Isao Echizen and
               Noboru Kunihiro and
               Ry{\^{o}}ichi Sasaki},
  title     = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6434},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-16825-3},
  doi       = {10.1007/978-3-642-16825-3},
  isbn      = {978-3-642-16824-6},
  timestamp = {Wed, 10 Nov 2010 11:10:23 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2009,
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5594},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-02620-1},
  doi       = {10.1007/978-3-642-02620-1},
  isbn      = {978-3-642-02619-5},
  timestamp = {Wed, 24 Jun 2009 11:57:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-10366-7},
  doi       = {10.1007/978-3-642-10366-7},
  isbn      = {978-3-642-10365-0},
  timestamp = {Mon, 07 Dec 2009 19:04:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2009,
  editor    = {Shai Halevi},
  title     = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5677},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-03356-8},
  doi       = {10.1007/978-3-642-03356-8},
  isbn      = {978-3-642-03355-1},
  timestamp = {Wed, 07 Oct 2009 16:59:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2009,
  editor    = {Antoine Joux},
  title     = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5479},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-01001-9},
  doi       = {10.1007/978-3-642-01001-9},
  isbn      = {978-3-642-01000-2},
  timestamp = {Thu, 23 Apr 2009 15:05:49 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2009,
  editor    = {Dong Hoon Lee and
               Seokhie Hong},
  title     = {Information, Security and Cryptology - {ICISC} 2009, 12th International
               Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5984},
  publisher = {Springer},
  year      = {2010},
  url       = {http://dx.doi.org/10.1007/978-3-642-14423-3},
  doi       = {10.1007/978-3-642-14423-3},
  isbn      = {978-3-642-14422-6},
  timestamp = {Tue, 08 Dec 2015 10:44:41 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2009,
  editor    = {Pierangela Samarati and
               Moti Yung and
               Fabio Martinelli and
               Claudio Agostino Ardagna},
  title     = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5735},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-04474-8},
  doi       = {10.1007/978-3-642-04474-8},
  isbn      = {978-3-642-04473-1},
  timestamp = {Mon, 12 Oct 2009 14:09:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2009,
  editor    = {Tsuyoshi Takagi and
               Masahiro Mambo},
  title     = {Advances in Information and Computer Security, 4th International Workshop
               on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5824},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-04846-3},
  doi       = {10.1007/978-3-642-04846-3},
  isbn      = {978-3-642-04845-6},
  timestamp = {Mon, 26 Oct 2009 21:10:36 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iwsec/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2009,
  editor    = {Michael J. Jacobson Jr. and
               Vincent Rijmen and
               Reihaneh Safavi{-}Naini},
  title     = {Selected Areas in Cryptography, 16th Annual International Workshop,
               {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5867},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-05445-7},
  doi       = {10.1007/978-3-642-05445-7},
  isbn      = {978-3-642-05443-3},
  timestamp = {Thu, 05 Nov 2009 14:39:58 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2008,
  editor    = {Yi Mu and
               Willy Susilo and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
               2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5107},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-3-540-69971-2},
  timestamp = {Thu, 03 Jul 2008 14:33:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2008,
  editor    = {Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5023},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-3-540-68159-5},
  timestamp = {Mon, 09 Jun 2008 14:14:56 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2008,
  editor    = {Josef Pieprzyk},
  title     = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5350},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-3-540-89254-0},
  timestamp = {Thu, 04 Dec 2008 21:35:54 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008asia,
  editor    = {Masayuki Abe and
               Virgil D. Gligor},
  title     = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-979-1},
  timestamp = {Thu, 15 May 2008 12:56:34 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2008asia},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2008,
  editor    = {Tal Malkin},
  title     = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
               the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4964},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-3-540-79262-8},
  timestamp = {Wed, 16 Apr 2008 10:52:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2008,
  editor    = {Pil Joong Lee and
               Jung Hee Cheon},
  title     = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5461},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-00730-9},
  doi       = {10.1007/978-3-642-00730-9},
  isbn      = {978-3-642-00729-3},
  timestamp = {Fri, 20 Mar 2009 10:20:36 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2008,
  editor    = {Roberto Maria Avanzi and
               Liam Keliher and
               Francesco Sica},
  title     = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5381},
  publisher = {Springer},
  year      = {2009},
  url       = {http://dx.doi.org/10.1007/978-3-642-04159-4},
  doi       = {10.1007/978-3-642-04159-4},
  isbn      = {978-3-642-04158-7},
  timestamp = {Wed, 16 Dec 2009 09:41:13 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2007,
  editor    = {Josef Pieprzyk and
               Hossein Ghodosi and
               Ed Dawson},
  title     = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4586},
  publisher = {Springer},
  year      = {2007},
  isbn      = {978-3-540-73457-4},
  timestamp = {Thu, 05 Jul 2007 15:04:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2007,
  editor    = {Alex Biryukov},
  title     = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4593},
  publisher = {Springer},
  year      = {2007},
  isbn      = {978-3-540-74617-1},
  timestamp = {Mon, 03 Sep 2007 11:02:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2006,
  editor    = {Xuejia Lai and
               Kefei Chen},
  title     = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4284},
  publisher = {Springer},
  year      = {2006},
  isbn      = {3-540-49475-8},
  timestamp = {Mon, 20 Nov 2006 14:23:27 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/vietcrypt/2006,
  editor    = {Phong Q. Nguyen},
  title     = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4341},
  publisher = {Springer},
  year      = {2006},
  url       = {http://dx.doi.org/10.1007/11958239},
  doi       = {10.1007/11958239},
  isbn      = {3-540-68799-8},
  timestamp = {Fri, 06 Mar 2015 14:11:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/vietcrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2005,
  editor    = {Dongho Won and
               Seungjoo Kim},
  title     = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3935},
  publisher = {Springer},
  year      = {2006},
  isbn      = {3-540-33354-1},
  timestamp = {Mon, 21 Aug 2006 14:37:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icisc/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier