BibTeX records: Yu Sasaki

download as .bib file

@article{DBLP:journals/tosc/CanteautLNRSS17,
  author    = {Anne Canteaut and
               Eran Lambooij and
               Samuel Neves and
               Shahram Rasoolzadeh and
               Yu Sasaki and
               Marc Stevens},
  title     = {Refined Probability of Differential Characteristics Including Dependency
               Between Multiple Rounds},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {2},
  pages     = {203--227},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i2.203-227},
  doi       = {10.13154/tosc.v2017.i2.203-227},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tosc/CanteautLNRSS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tosc/CidHPSS17,
  author    = {Carlos Cid and
               Tao Huang and
               Thomas Peyrin and
               Yu Sasaki and
               Ling Song},
  title     = {A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2017},
  number    = {3},
  pages     = {73--107},
  year      = {2017},
  url       = {https://doi.org/10.13154/tosc.v2017.i3.73-107},
  doi       = {10.13154/tosc.v2017.i3.73-107},
  timestamp = {Thu, 05 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tosc/CidHPSS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ches/BanikPPSST17,
  author    = {Subhadeep Banik and
               Sumit Kumar Pandey and
               Thomas Peyrin and
               Yu Sasaki and
               Siang Meng Sim and
               Yosuke Todo},
  title     = {{GIFT:} {A} Small Present - Towards Reaching the Limit of Lightweight
               Encryption},
  booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
               Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  pages     = {321--345},
  year      = {2017},
  crossref  = {DBLP:conf/ches/2017},
  url       = {https://doi.org/10.1007/978-3-319-66787-4_16},
  doi       = {10.1007/978-3-319-66787-4_16},
  timestamp = {Mon, 18 Sep 2017 13:22:01 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/BanikPPSST17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SasakiT17,
  author    = {Yu Sasaki and
               Yosuke Todo},
  title     = {New Impossible Differential Search Tool from Design and Cryptanalysis
               Aspects - Revealing Structural Properties of Several Ciphers},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  pages     = {185--215},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-56617-7_7},
  doi       = {10.1007/978-3-319-56617-7_7},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/SasakiT17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/HiroseSY17,
  author    = {Shoichi Hirose and
               Yu Sasaki and
               Kan Yasuda},
  title     = {Rate-One {AE} with Security Under {RUP}},
  booktitle = {Information Security - 20th International Conference, {ISC} 2017,
               Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  pages     = {3--20},
  year      = {2017},
  crossref  = {DBLP:conf/isw/2017},
  url       = {https://doi.org/10.1007/978-3-319-69659-1_1},
  doi       = {10.1007/978-3-319-69659-1_1},
  timestamp = {Mon, 13 Nov 2017 18:16:01 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/isw/HiroseSY17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KondoSTI17,
  author    = {Kota Kondo and
               Yu Sasaki and
               Yosuke Todo and
               Tetsu Iwata},
  title     = {Analyzing Key Schedule of Simon: Iterative Key Differences and Application
               to Related-Key Impossible Differentials},
  booktitle = {Advances in Information and Computer Security - 12th International
               Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
               September 1, 2017, Proceedings},
  pages     = {141--158},
  year      = {2017},
  crossref  = {DBLP:conf/iwsec/2017},
  url       = {https://doi.org/10.1007/978-3-319-64200-0_9},
  doi       = {10.1007/978-3-319-64200-0_9},
  timestamp = {Tue, 15 Aug 2017 08:03:31 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/KondoSTI17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secitc/SasakiT17,
  author    = {Yu Sasaki and
               Yosuke Todo},
  title     = {New Algorithm for Modeling S-box in {MILP} Based Differential and
               Division Trail Search},
  booktitle = {Innovative Security Solutions for Information Technology and Communications
               - 10th International Conference, SecITC 2017, Bucharest, Romania,
               June 8-9, 2017, Revised Selected Papers},
  pages     = {150--165},
  year      = {2017},
  crossref  = {DBLP:conf/secitc/2017},
  url       = {https://doi.org/10.1007/978-3-319-69284-5_11},
  doi       = {10.1007/978-3-319-69284-5_11},
  timestamp = {Thu, 02 Nov 2017 17:03:56 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/secitc/SasakiT17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/HiroseSY17,
  author    = {Shoichi Hirose and
               Yu Sasaki and
               Kan Yasuda},
  title     = {Message-Recovery MACs and Verification-Unskippable {AE}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {260},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/260},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/HiroseSY17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CanteautLNRSS17,
  author    = {Anne Canteaut and
               Eran Lambooij and
               Samuel Neves and
               Shahram Rasoolzadeh and
               Yu Sasaki and
               Marc Stevens},
  title     = {Refined Probability of Differential Characteristics Including Dependency
               Between Multiple Rounds},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {478},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/478},
  timestamp = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CanteautLNRSS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BanikPPSTS17,
  author    = {Subhadeep Banik and
               Sumit Kumar Pandey and
               Thomas Peyrin and
               Siang Meng Sim and
               Yosuke Todo and
               Yu Sasaki},
  title     = {{GIFT:} {A} Small Present},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {622},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/622},
  timestamp = {Tue, 25 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BanikPPSTS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/CidHPSS17,
  author    = {Carlos Cid and
               Tao Huang and
               Thomas Peyrin and
               Yu Sasaki and
               Ling Song},
  title     = {Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {693},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/693},
  timestamp = {Tue, 25 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/CidHPSS17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BanikPPSST17,
  author    = {Subhadeep Banik and
               Sumit Kumar Pandey and
               Thomas Peyrin and
               Yu Sasaki and
               Siang Meng Sim and
               Yosuke Todo},
  title     = {{GIFT:} {A} Small Present (Full version)},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {760},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/760},
  timestamp = {Fri, 25 Aug 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BanikPPSST17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dcc/GuoJNS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Extended meet-in-the-middle attacks on some Feistel constructions},
  journal   = {Des. Codes Cryptography},
  volume    = {80},
  number    = {3},
  pages     = {587--618},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10623-015-0120-4},
  doi       = {10.1007/s10623-015-0120-4},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dcc/GuoJNS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki016,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Generic Internal State Recovery on Strengthened {HMAC:} \emph{n}-bit
               Secure {HMAC} Requires Key in All Blocks},
  journal   = {{IEICE} Transactions},
  volume    = {99-A},
  number    = {1},
  pages     = {22--30},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-a_1_22},
  timestamp = {Mon, 11 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/JeanNS016,
  author    = {J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki and
               Lei Wang},
  title     = {Practical Forgeries and Distinguishers against {PAES}},
  journal   = {{IEICE} Transactions},
  volume    = {99-A},
  number    = {1},
  pages     = {39--48},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-a_1_39},
  timestamp = {Mon, 11 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/JeanNS016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki016a,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Message Extension Attack against Authenticated Encryptions: Application
               to {PANDA}},
  journal   = {{IEICE} Transactions},
  volume    = {99-A},
  number    = {1},
  pages     = {49--57},
  year      = {2016},
  url       = {http://search.ieice.org/bin/summary.php?id=e99-a_1_49},
  timestamp = {Mon, 11 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki016a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNQSS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Kexin Qiao and
               Yu Sasaki and
               Siang Meng Sim},
  title     = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
               for S-box Designs},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2016},
  number    = {1},
  pages     = {33--56},
  year      = {2016},
  url       = {https://doi.org/10.13154/tosc.v2016.i1.33-56},
  doi       = {10.13154/tosc.v2016.i1.33-56},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tosc/GuoJNQSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tosc/GuoJNS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
               Feistel Constructions},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2016},
  number    = {2},
  pages     = {307--337},
  year      = {2016},
  url       = {https://doi.org/10.13154/tosc.v2016.i2.307-337},
  doi       = {10.13154/tosc.v2016.i2.307-337},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tosc/GuoJNS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BagheriMS16,
  author    = {Nasour Bagheri and
               Florian Mendel and
               Yu Sasaki},
  title     = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate
               {PAEQ}},
  booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  pages     = {301--316},
  year      = {2016},
  crossref  = {DBLP:conf/acisp/2016-2},
  url       = {https://doi.org/10.1007/978-3-319-40367-0_19},
  doi       = {10.1007/978-3-319-40367-0_19},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/BagheriMS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/KondoSI16,
  author    = {Kota Kondo and
               Yu Sasaki and
               Tetsu Iwata},
  title     = {On the Design Rationale of Simon Block Cipher: Integral Attacks and
               Impossible Differential Attacks against Simon Variants},
  booktitle = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  pages     = {518--536},
  year      = {2016},
  crossref  = {DBLP:conf/acns/2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5_28},
  doi       = {10.1007/978-3-319-39555-5_28},
  timestamp = {Tue, 23 May 2017 01:13:09 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/KondoSI16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/TodoLS16,
  author    = {Yosuke Todo and
               Gregor Leander and
               Yu Sasaki},
  title     = {Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM,
               and Midori64},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  pages     = {3--33},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53890-6_1},
  doi       = {10.1007/978-3-662-53890-6_1},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/TodoLS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NikolicS16,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {A New Algorithm for the Unbalanced Meet-in-the-Middle Problem},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  pages     = {627--647},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53887-6_23},
  doi       = {10.1007/978-3-662-53887-6_23},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/NikolicS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeierleJKL0PSSS16,
  author    = {Christof Beierle and
               J{\'{e}}r{\'{e}}my Jean and
               Stefan K{\"{o}}lbl and
               Gregor Leander and
               Amir Moradi and
               Thomas Peyrin and
               Yu Sasaki and
               Pascal Sasdrich and
               Siang Meng Sim},
  title     = {The {SKINNY} Family of Block Ciphers and Its Low-Latency Variant {MANTIS}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  pages     = {123--153},
  year      = {2016},
  crossref  = {DBLP:conf/crypto/2016-2},
  url       = {https://doi.org/10.1007/978-3-662-53008-5_5},
  doi       = {10.1007/978-3-662-53008-5_5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/BeierleJKL0PSSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/BagheriHJMS16,
  author    = {Nasour Bagheri and
               Tao Huang and
               Keting Jia and
               Florian Mendel and
               Yu Sasaki},
  title     = {Cryptanalysis of Reduced {NORX}},
  booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  pages     = {554--574},
  year      = {2016},
  crossref  = {DBLP:conf/fse/2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5_28},
  doi       = {10.1007/978-3-662-52993-5_28},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/BagheriHJMS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SasakiT16,
  author    = {Yu Sasaki and
               Yosuke Todo},
  title     = {New Differential Bounds and Division Property of Lilliput: Block Cipher
               with Extended Generalized Feistel Network},
  booktitle = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
               St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  pages     = {264--283},
  year      = {2016},
  crossref  = {DBLP:conf/sacrypt/2016},
  url       = {https://doi.org/10.1007/978-3-319-69453-5_15},
  doi       = {10.1007/978-3-319-69453-5_15},
  timestamp = {Fri, 20 Oct 2017 13:43:28 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/SasakiT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NikolicS16,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {Refinements of the k-tree Algorithm for the Generalized Birthday Problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {312},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/312},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NikolicS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BagheriHJMS16,
  author    = {Nasour Bagheri and
               Tao Huang and
               Keting Jia and
               Florian Mendel and
               Yu Sasaki},
  title     = {Cryptanalysis of Reduced {NORX}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {436},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/436},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BagheriHJMS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/KondoSI16,
  author    = {Kota Kondo and
               Yu Sasaki and
               Tetsu Iwata},
  title     = {On the Design Rationale of {SIMON} Block Cipher: Integral Attacks
               and Impossible Differential Attacks against {SIMON} Variants},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {625},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/625},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/KondoSI16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BeierleJKL0PSSS16,
  author    = {Christof Beierle and
               J{\'{e}}r{\'{e}}my Jean and
               Stefan K{\"{o}}lbl and
               Gregor Leander and
               Amir Moradi and
               Thomas Peyrin and
               Yu Sasaki and
               Pascal Sasdrich and
               Siang Meng Sim},
  title     = {The {SKINNY} Family of Block Ciphers and its Low-Latency Variant {MANTIS}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {660},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/660},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/BeierleJKL0PSSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/TodoLS16,
  author    = {Yosuke Todo and
               Gregor Leander and
               Yu Sasaki},
  title     = {Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM,
               and Midori64},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {732},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/732},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/TodoLS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NikolicS16a,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {A New Algorithm for the Unbalanced Meet-in-the-Middle Problem},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {851},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/851},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NikolicS16a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001JNSS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki and
               Siang Meng Sim},
  title     = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria
               for S-box Designs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {973},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/973},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/0001JNSS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GuoJNS16,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding
               Feistel Constructions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1162},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1162},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GuoJNS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiT16,
  author    = {Yu Sasaki and
               Yosuke Todo},
  title     = {New Impossible Differential Search Tool from Design and Cryptanalysis
               Aspects},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {1181},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/1181},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SasakiT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:books/daglib/0036974,
  author    = {Kazuo Sakiyama and
               Yu Sasaki and
               Yang Li},
  title     = {Security of Block Ciphers - From Algorithm Design to Hardware Implementation},
  publisher = {Wiley},
  year      = {2015},
  url       = {http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118660013.html},
  isbn      = {978-1-118-66001-0},
  timestamp = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/books/daglib/0036974},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWW15,
  author    = {Yu Sasaki and
               Gaoli Wang and
               Lei Wang},
  title     = {Improved Single-Key Distinguisher on {HMAC-MD5} and Key Recovery Attacks
               on Sandwich-MAC-MD5 and {MD5-MAC}},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {26--38},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_26},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiW15,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Bitwise Partial-Sum: {A} New Tool for Integral Analysis against {ARX}
               Designs},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {49--60},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_49},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki15,
  author    = {Yu Sasaki},
  title     = {Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last
               Network Twist},
  journal   = {{IEICE} Transactions},
  volume    = {98-A},
  number    = {1},
  pages     = {61--71},
  year      = {2015},
  url       = {http://search.ieice.org/bin/summary.php?id=e98-a_1_61},
  timestamp = {Tue, 19 May 2015 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NikolicS15,
  author    = {Ivica Nikolic and
               Yu Sasaki},
  title     = {Refinements of the k-tree Algorithm for the Generalized Birthday Problem},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  pages     = {683--703},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-48800-3_28},
  doi       = {10.1007/978-3-662-48800-3_28},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/NikolicS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiY15,
  author    = {Yu Sasaki and
               Kan Yasuda},
  title     = {How to Incorporate Associated Data in Sponge-Based Authenticated Encryption},
  booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  pages     = {353--370},
  year      = {2015},
  crossref  = {DBLP:conf/ctrsa/2015},
  url       = {https://doi.org/10.1007/978-3-319-16715-2_19},
  doi       = {10.1007/978-3-319-16715-2_19},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/SasakiY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SasakiY15,
  author    = {Yu Sasaki and
               Kan Yasuda},
  title     = {A New Mode of Operation for Incremental Authenticated Encryption with
               Associated Data},
  booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  pages     = {397--416},
  year      = {2015},
  crossref  = {DBLP:conf/sacrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-31301-6_23},
  doi       = {10.1007/978-3-319-31301-6_23},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/SasakiY15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanS015,
  author    = {J{\'{e}}r{\'{e}}my Jean and
               Yu Sasaki and
               Lei Wang},
  title     = {Analysis of the {CAESAR} Candidate Silver},
  booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  pages     = {493--509},
  year      = {2015},
  crossref  = {DBLP:conf/sacrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-31301-6_28},
  doi       = {10.1007/978-3-319-31301-6_28},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/JeanS015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001SWWW15,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Meiqin Wang and
               Long Wen},
  title     = {Equivalent Key Recovery Attacks against {HMAC} and {NMAC} with Whirlpool
               Reduced to 7 Rounds},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {75},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/075},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/0001SWWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001SWW15,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Shuang Wu},
  title     = {Cryptanalysis of HMAC/NMAC-Whirlpool},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {149},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/149},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/0001SWW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/0001JNQSS15,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Kexin Qiao and
               Yu Sasaki and
               Siang Meng Sim},
  title     = {Invariant Subspace Attack Against Full Midori64},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1189},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1189},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/0001JNQSS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Comprehensive Study of Integral Analysis on LBlock},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {1},
  pages     = {127--138},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a_1_127},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki14a,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses on a Merkle-Damg{\aa}rd Based {MAC} - Almost Universal
               Forgery and Distinguishing-\emph{H} Attacks},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {1},
  pages     = {167--176},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a_1_167},
  timestamp = {Thu, 15 May 2014 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiW14a,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Distinguishers on Double-Branch Compression Function and Applications
               to Round-Reduced {RIPEMD-128} and {RIPEMD-160}},
  journal   = {{IEICE} Transactions},
  volume    = {97-A},
  number    = {1},
  pages     = {177--190},
  year      = {2014},
  url       = {http://search.ieice.org/bin/summary.php?id=e97-a_1_177},
  timestamp = {Fri, 08 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiW14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/Sasaki14,
  author    = {Yu Sasaki},
  title     = {Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results
               and Applications},
  booktitle = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  pages     = {253--270},
  year      = {2014},
  crossref  = {DBLP:conf/acns/2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5_16},
  doi       = {10.1007/978-3-319-07536-5_16},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/Sasaki14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001JNS14,
  author    = {Jian Guo and
               J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks on Generic Feistel Constructions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  pages     = {458--477},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-45611-8_24},
  doi       = {10.1007/978-3-662-45611-8_24},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/0001JNS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cans/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Message Extension Attack against Authenticated Encryptions: Application
               to {PANDA}},
  booktitle = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  pages     = {82--97},
  year      = {2014},
  crossref  = {DBLP:conf/cans/2014},
  url       = {https://doi.org/10.1007/978-3-319-12280-9_6},
  doi       = {10.1007/978-3-319-12280-9_6},
  timestamp = {Wed, 24 May 2017 08:27:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cans/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001PSW14,
  author    = {Jian Guo and
               Thomas Peyrin and
               Yu Sasaki and
               Lei Wang},
  title     = {Updates on Generic Attacks against {HMAC} and {NMAC}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {131--148},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_8},
  doi       = {10.1007/978-3-662-44371-2_8},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/0001PSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiTWIO14,
  author    = {Yu Sasaki and
               Yuuki Tokushige and
               Lei Wang and
               Mitsugu Iwamoto and
               Kazuo Ohta},
  title     = {An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers
               and Proposals of ShiftBytes Parameters for Gr{\o}stl},
  booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
               the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
               2014. Proceedings},
  pages     = {424--443},
  year      = {2014},
  crossref  = {DBLP:conf/ctrsa/2014},
  url       = {https://doi.org/10.1007/978-3-319-04852-9_22},
  doi       = {10.1007/978-3-319-04852-9_22},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/SasakiTWIO14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/0001SWWW14,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Meiqin Wang and
               Long Wen},
  title     = {Equivalent Key Recovery Attacks Against {HMAC} and {NMAC} with Whirlpool
               Reduced to 7 Rounds},
  booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  pages     = {571--590},
  year      = {2014},
  crossref  = {DBLP:conf/fse/2014},
  url       = {https://doi.org/10.1007/978-3-662-46706-0_29},
  doi       = {10.1007/978-3-662-46706-0_29},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/0001SWWW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangLVSRT14,
  author    = {Qingju Wang and
               Zhiqiang Liu and
               Kerem Varici and
               Yu Sasaki and
               Vincent Rijmen and
               Yosuke Todo},
  title     = {Cryptanalysis of Reduced-Round {SIMON32} and {SIMON48}},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  pages     = {143--160},
  year      = {2014},
  crossref  = {DBLP:conf/indocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-13039-2_9},
  doi       = {10.1007/978-3-319-13039-2_9},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/WangLVSRT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/JeanNSW14,
  author    = {J{\'{e}}r{\'{e}}my Jean and
               Ivica Nikolic and
               Yu Sasaki and
               Lei Wang},
  title     = {Practical Cryptanalysis of {PAES}},
  booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
               Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  pages     = {228--242},
  year      = {2014},
  crossref  = {DBLP:conf/sacrypt/2014},
  url       = {https://doi.org/10.1007/978-3-319-13051-4_14},
  doi       = {10.1007/978-3-319-13051-4_14},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/JeanNSW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/scn/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Generic Attacks on Strengthened {HMAC:} n-bit Secure {HMAC} Requires
               Key in All Blocks},
  booktitle = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  pages     = {324--339},
  year      = {2014},
  crossref  = {DBLP:conf/scn/2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7_19},
  doi       = {10.1007/978-3-319-10879-7_19},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/scn/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiW14,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {A Forgery Attack against PANDA-s},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {217},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/217},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SasakiW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiW14a,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {A Practical Universal Forgery Attack against {PAES-8}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {218},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/218},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SasakiW14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/WangLVSRT14,
  author    = {Qingju Wang and
               Zhiqiang Liu and
               Kerem Varici and
               Yu Sasaki and
               Vincent Rijmen and
               Yosuke Todo},
  title     = {Cryptanalysis of Reduced-round {SIMON32} and {SIMON48}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {761},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/761},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/WangLVSRT14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki13,
  author    = {Yu Sasaki},
  title     = {Meet-in-the-Middle Preimage Attacks on {AES} Hashing Modes and an
               Application to Whirlpool},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {1},
  pages     = {121--130},
  year      = {2013},
  url       = {http://search.ieice.org/bin/summary.php?id=e96-a_1_121},
  timestamp = {Tue, 29 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki13a,
  author    = {Yu Sasaki},
  title     = {Boomerang Distinguishers on MD4-Based Hash Functions: First Practical
               Results on Full 5-Pass {HAVAL} Compression Function},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {1},
  pages     = {131--140},
  year      = {2013},
  url       = {http://search.ieice.org/bin/summary.php?id=e96-a_1_131},
  timestamp = {Tue, 29 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki13a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiA13,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta},
  journal   = {{IEICE} Transactions},
  volume    = {96-A},
  number    = {1},
  pages     = {141--149},
  year      = {2013},
  url       = {http://search.ieice.org/bin/summary.php?id=e96-a_1_141},
  timestamp = {Tue, 29 Jan 2013 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiA13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IsobeSC13,
  author    = {Takanori Isobe and
               Yu Sasaki and
               Jiageng Chen},
  title     = {Related-Key Boomerang Attacks on {KATAN32/48/64}},
  booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  pages     = {268--285},
  year      = {2013},
  crossref  = {DBLP:conf/acisp/2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3_19},
  doi       = {10.1007/978-3-642-39059-3_19},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/IsobeSC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/Sasaki13,
  author    = {Yu Sasaki},
  title     = {Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last
               Network Twist},
  booktitle = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  pages     = {170--185},
  year      = {2013},
  crossref  = {DBLP:conf/acns/2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1_11},
  doi       = {10.1007/978-3-642-38980-1_11},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/Sasaki13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001SWW13,
  author    = {Jian Guo and
               Yu Sasaki and
               Lei Wang and
               Shuang Wu},
  title     = {Cryptanalysis of HMAC/NMAC-Whirlpool},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {21--40},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-42045-0_2},
  doi       = {10.1007/978-3-642-42045-0_2},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/0001SWW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/IwamotoPS13,
  author    = {Mitsugu Iwamoto and
               Thomas Peyrin and
               Yu Sasaki},
  title     = {Limited-Birthday Distinguishers for Hash Functions - Collisions beyond
               the Birthday Bound Can Be Meaningful},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {504--523},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-42045-0_26},
  doi       = {10.1007/978-3-642-42045-0_26},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/IwamotoPS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/SasakiLSS13,
  author    = {Yu Sasaki and
               Yang Li and
               Hikaru Sakamoto and
               Kazuo Sakiyama},
  title     = {Coupon Collector's Problem for Fault Analysis against {AES} - High
               Tolerance for Noisy Fault Injections},
  booktitle = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  pages     = {213--220},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1_18},
  doi       = {10.1007/978-3-642-39884-1_18},
  timestamp = {Fri, 23 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/SasakiLSS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiW13,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Bitwise Partial-Sum on {HIGHT:} {A} New Tool for Integral Analysis
               Against {ARX} Designs},
  booktitle = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  pages     = {189--202},
  year      = {2013},
  crossref  = {DBLP:conf/icisc/2013},
  url       = {https://doi.org/10.1007/978-3-319-12160-4_12},
  doi       = {10.1007/978-3-319-12160-4_12},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/SasakiW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NaitoSWY13,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Lei Wang and
               Kan Yasuda},
  title     = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}},
  booktitle = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  pages     = {83--98},
  year      = {2013},
  crossref  = {DBLP:conf/iwsec/2013},
  url       = {https://doi.org/10.1007/978-3-642-41383-4_6},
  doi       = {10.1007/978-3-642-41383-4_6},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/NaitoSWY13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TodoS13,
  author    = {Yosuke Todo and
               Yu Sasaki},
  title     = {New Property of Diffusion Switching Mechanism on {CLEFIA} and Its
               Application to {DFA}},
  booktitle = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  pages     = {99--114},
  year      = {2013},
  crossref  = {DBLP:conf/iwsec/2013},
  url       = {https://doi.org/10.1007/978-3-642-41383-4_7},
  doi       = {10.1007/978-3-642-41383-4_7},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/TodoS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SasakiW13,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Improved Single-Key Distinguisher on {HMAC-MD5} and Key Recovery Attacks
               on Sandwich-MAC-MD5},
  booktitle = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  pages     = {493--512},
  year      = {2013},
  crossref  = {DBLP:conf/sacrypt/2013},
  url       = {https://doi.org/10.1007/978-3-662-43414-7_25},
  doi       = {10.1007/978-3-662-43414-7_25},
  timestamp = {Mon, 25 Sep 2017 10:36:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/SasakiW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13,
  author    = {Yu Sasaki and
               Wataru Komatsubara and
               Yasuhide Sakai and
               Lei Wang and
               Mitsugu Iwamoto and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5}
               and {HAVAL}},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {111--122},
  year      = {2013},
  crossref  = {DBLP:conf/secrypt/2013},
  url       = {http://ieeexplore.ieee.org/document/7223160/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/SasakiKSWISO13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/IwamotoPS13,
  author    = {Mitsugu Iwamoto and
               Thomas Peyrin and
               Yu Sasaki},
  title     = {Limited-birthday Distinguishers for Hash Functions - Collisions Beyond
               the Birthday Bound can be Meaningful},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {611},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/611},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/IwamotoPS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki12,
  author    = {Yu Sasaki},
  title     = {Known-Key Attacks on Rijndael with Large Blocks and Strengthening
               ShiftRow Parameter},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {21--28},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_21},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/WangSKSO12,
  author    = {Lei Wang and
               Yu Sasaki and
               Wataru Komatsubara and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch
               Hash Functions {RIPEMD} and {RIPEMD-128}},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {100--110},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_100},
  timestamp = {Sat, 14 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/WangSKSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiMA12,
  author    = {Yu Sasaki and
               Florian Mendel and
               Kazumaro Aoki},
  title     = {Preimage Attacks against PKC98-Hash and {HAS-V}},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {1},
  pages     = {111--124},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_1_111},
  timestamp = {Fri, 13 Jan 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiMA12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/OhtaharaSS12,
  author    = {Chiaki Ohtahara and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on the Step-Reduced {RIPEMD-128} and {RIPEMD-160}},
  journal   = {{IEICE} Transactions},
  volume    = {95-A},
  number    = {10},
  pages     = {1729--1739},
  year      = {2012},
  url       = {http://search.ieice.org/bin/summary.php?id=e95-a_10_1729},
  timestamp = {Mon, 26 Nov 2012 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/OhtaharaSS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiEHK12,
  author    = {Yu Sasaki and
               Sareh Emami and
               Deukjo Hong and
               Ashish Kumar},
  title     = {Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application
               to Camellia},
  booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
               2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  pages     = {87--100},
  year      = {2012},
  crossref  = {DBLP:conf/acisp/2012},
  url       = {https://doi.org/10.1007/978-3-642-31448-3_7},
  doi       = {10.1007/978-3-642-31448-3_7},
  timestamp = {Thu, 15 Jun 2017 21:41:12 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/SasakiEHK12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Distinguishers beyond Three Rounds of the {RIPEMD-128/-160} Compression
               Functions},
  booktitle = {Applied Cryptography and Network Security - 10th International Conference,
               {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  pages     = {275--292},
  year      = {2012},
  crossref  = {DBLP:conf/acns/2012},
  url       = {https://doi.org/10.1007/978-3-642-31284-7_17},
  doi       = {10.1007/978-3-642-31284-7_17},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/acns/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWSSO12,
  author    = {Yu Sasaki and
               Lei Wang and
               Yasuhide Sakai and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Three-Subset Meet-in-the-Middle Attack on Reduced {XTEA}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  pages     = {138--154},
  year      = {2012},
  crossref  = {DBLP:conf/africacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0_9},
  doi       = {10.1007/978-3-642-31410-0_9},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/SasakiWSSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiWWW12,
  author    = {Yu Sasaki and
               Lei Wang and
               Shuang Wu and
               Wenling Wu},
  title     = {Investigating Fundamental Security Requirements on Whirlpool: Improved
               Preimage and Collision Attacks},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {562--579},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4_34},
  doi       = {10.1007/978-3-642-34961-4_34},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/SasakiWWW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PeyrinSW12,
  author    = {Thomas Peyrin and
               Yu Sasaki and
               Lei Wang},
  title     = {Generic Related-Key Attacks for {HMAC}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {580--597},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4_35},
  doi       = {10.1007/978-3-642-34961-4_35},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/PeyrinSW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Sasaki12,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses on a Merkle-Damg{\aa}rd Based {MAC} - Almost Universal
               Forgery and Distinguishing-H Attacks},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  pages     = {411--427},
  year      = {2012},
  crossref  = {DBLP:conf/eurocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4_25},
  doi       = {10.1007/978-3-642-29011-4_25},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/Sasaki12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Comprehensive Study of Integral Analysis on 22-Round LBlock},
  booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  pages     = {156--169},
  year      = {2012},
  crossref  = {DBLP:conf/icisc/2012},
  url       = {https://doi.org/10.1007/978-3-642-37682-5_12},
  doi       = {10.1007/978-3-642-37682-5_12},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KoyamaSK12,
  author    = {Takuma Koyama and
               Yu Sasaki and
               Noboru Kunihiro},
  title     = {Multi-differential Cryptanalysis on Reduced {DM-PRESENT-80:} Collisions
               and Other Differential Properties},
  booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  pages     = {352--367},
  year      = {2012},
  crossref  = {DBLP:conf/icisc/2012},
  url       = {https://doi.org/10.1007/978-3-642-37682-5_25},
  doi       = {10.1007/978-3-642-37682-5_25},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/KoyamaSK12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NakasoneLSIOS12,
  author    = {Toshiki Nakasone and
               Yang Li and
               Yu Sasaki and
               Mitsugu Iwamoto and
               Kazuo Ohta and
               Kazuo Sakiyama},
  title     = {Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision
               Distinguisher},
  booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  pages     = {395--409},
  year      = {2012},
  crossref  = {DBLP:conf/icisc/2012},
  url       = {https://doi.org/10.1007/978-3-642-37682-5_28},
  doi       = {10.1007/978-3-642-37682-5_28},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/NakasoneLSIOS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Sasaki12,
  author    = {Yu Sasaki},
  title     = {Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers
               with Several Rounds},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  pages     = {265--282},
  year      = {2012},
  crossref  = {DBLP:conf/indocrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34931-7_16},
  doi       = {10.1007/978-3-642-34931-7_16},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/Sasaki12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KoyamaWSSO12,
  author    = {Takuma Koyama and
               Lei Wang and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {New Truncated Differential Cryptanalysis on 3D Block Cipher},
  booktitle = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  pages     = {109--125},
  year      = {2012},
  crossref  = {DBLP:conf/ispec/2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2_8},
  doi       = {10.1007/978-3-642-29101-2_8},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ispec/KoyamaWSSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12,
  author    = {Yu Sasaki and
               Lei Wang and
               Yasuhiro Takasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Boomerang Distinguishers for Full {HAS-160} Compression Function},
  booktitle = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  pages     = {156--169},
  year      = {2012},
  crossref  = {DBLP:conf/iwsec/2012},
  url       = {https://doi.org/10.1007/978-3-642-34117-5_10},
  doi       = {10.1007/978-3-642-34117-5_10},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/Sasaki0TSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/0007SSO12,
  author    = {Lei Wang and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash
               Function},
  booktitle = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  pages     = {170--181},
  year      = {2012},
  crossref  = {DBLP:conf/iwsec/2012},
  url       = {https://doi.org/10.1007/978-3-642-34117-5_11},
  doi       = {10.1007/978-3-642-34117-5_11},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/0007SSO12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {Meet-in-the-Middle Technique for Integral Attacks against Feistel
               Ciphers},
  booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  pages     = {234--251},
  year      = {2012},
  crossref  = {DBLP:conf/sacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-35999-6_16},
  doi       = {10.1007/978-3-642-35999-6_16},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki012,
  author    = {Yu Sasaki and
               Lei Wang},
  title     = {2-Dimension Sums: Distinguishers Beyond Three Rounds of {RIPEMD-128}
               and {RIPEMD-160}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {49},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/049},
  timestamp = {Wed, 19 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Sasaki012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/PeyrinS012,
  author    = {Thomas Peyrin and
               Yu Sasaki and
               Lei Wang},
  title     = {Generic Related-key Attacks for {HMAC}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {684},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/684},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/PeyrinS012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/WangS11,
  author    = {Lei Wang and
               Yu Sasaki},
  title     = {Preimage Attack on 23-Step Tiger},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {1},
  pages     = {110--120},
  year      = {2011},
  url       = {http://search.ieice.org/bin/summary.php?id=e94-a_1_110},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/WangS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses of Double-Mix Merkle-Damg{\aa}rd Mode in the Original
               Version of {AURORA-512}},
  journal   = {{IEICE} Transactions},
  volume    = {94-A},
  number    = {1},
  pages     = {121--128},
  year      = {2011},
  url       = {http://search.ieice.org/bin/summary.php?id=e94-a_1_121},
  timestamp = {Wed, 12 Jan 2011 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OhtaharaOSS11,
  author    = {Chiaki Ohtahara and
               Keita Okada and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on Full-ARIRANG (Poster)},
  booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  pages     = {417--422},
  year      = {2011},
  crossref  = {DBLP:conf/acisp/2011},
  url       = {https://doi.org/10.1007/978-3-642-22497-3_28},
  doi       = {10.1007/978-3-642-22497-3_28},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/OhtaharaOSS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Collisions of {MMO-MD5} and Their Impact on Original {MD5}},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
               on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  pages     = {117--133},
  year      = {2011},
  crossref  = {DBLP:conf/africacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-21969-6_8},
  doi       = {10.1007/978-3-642-21969-6_8},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangSKOS11,
  author    = {Lei Wang and
               Yu Sasaki and
               Wataru Komatsubara and
               Kazuo Ohta and
               Kazuo Sakiyama},
  title     = {(Second) Preimage Attacks on Step-Reduced {RIPEMD/RIPEMD-128} with
               a New Local-Collision Approach},
  booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
               the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
               2011. Proceedings},
  pages     = {197--212},
  year      = {2011},
  crossref  = {DBLP:conf/ctrsa/2011},
  url       = {https://doi.org/10.1007/978-3-642-19074-2_14},
  doi       = {10.1007/978-3-642-19074-2_14},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/WangSKOS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Meet-in-the-Middle Preimage Attacks on {AES} Hashing Modes and an
               Application to Whirlpool},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {378--396},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9_22},
  doi       = {10.1007/978-3-642-21702-9_22},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiY11,
  author    = {Yu Sasaki and
               Kan Yasuda},
  title     = {Known-Key Distinguishers on 11-Round Feistel and Collision Attacks
               on Its Hashing Modes},
  booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  pages     = {397--415},
  year      = {2011},
  crossref  = {DBLP:conf/fse/2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9_23},
  doi       = {10.1007/978-3-642-21702-9_23},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/SasakiY11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiA11,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Improved Integral Analysis on Tweaked Lesamnta},
  booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  pages     = {1--17},
  year      = {2011},
  crossref  = {DBLP:conf/icisc/2011},
  url       = {https://doi.org/10.1007/978-3-642-31912-9_1},
  doi       = {10.1007/978-3-642-31912-9_1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/SasakiA11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SasakiTSO11,
  author    = {Yu Sasaki and
               Naoyuki Takayanagi and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Experimental Verification of Super-Sbox Analysis - Confirmation of
               Detailed Attack Complexity},
  booktitle = {Advances in Information and Computer Security - 6th International
               Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  pages     = {178--192},
  year      = {2011},
  crossref  = {DBLP:conf/iwsec/2011},
  url       = {https://doi.org/10.1007/978-3-642-25141-2_12},
  doi       = {10.1007/978-3-642-25141-2_12},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/SasakiTSO11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Sasaki11,
  author    = {Yu Sasaki},
  title     = {Boomerang Distinguishers on MD4-Family: First Practical Results on
               Full 5-Pass {HAVAL}},
  booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  pages     = {1--18},
  year      = {2011},
  crossref  = {DBLP:conf/sacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-28496-0_1},
  doi       = {10.1007/978-3-642-28496-0_1},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/Sasaki11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AokiRSS11,
  author    = {Kazumaro Aoki and
               G{\"{u}}nther Roland and
               Yu Sasaki and
               Martin Schl{\"{a}}ffer},
  title     = {Byte Slicing Gr{\o}stl - Optimized Intel {AES-NI} and 8-bit Implementations
               of the {SHA-3} Finalist Gr{\o}stl},
  booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
               and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  pages     = {124--133},
  year      = {2011},
  crossref  = {DBLP:conf/secrypt/2011},
  timestamp = {Thu, 27 Oct 2011 10:35:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/AokiRSS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhtaharaOSS11,
  author    = {Chiaki Ohtahara and
               Keita Okada and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle
               Feed-Forward},
  booktitle = {Information Security Applications - 12th International Workshop, {WISA}
               2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  pages     = {40--54},
  year      = {2011},
  crossref  = {DBLP:conf/wisa/2011},
  url       = {https://doi.org/10.1007/978-3-642-27890-7_4},
  doi       = {10.1007/978-3-642-27890-7_4},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wisa/OhtaharaOSS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOAK10,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Kazumaro Aoki and
               Noboru Kunihiro},
  title     = {Practical Password Recovery Attacks on {MD4} Based Prefix and Hybrid
               Authentication Protocols},
  journal   = {{IEICE} Transactions},
  volume    = {93-A},
  number    = {1},
  pages     = {84--92},
  year      = {2010},
  url       = {http://search.ieice.org/bin/summary.php?id=e93-a_1_84},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiWOAK10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/WangOSSK10,
  author    = {Lei Wang and
               Kazuo Ohta and
               Yu Sasaki and
               Kazuo Sakiyama and
               Noboru Kunihiro},
  title     = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and
               {NMAC}},
  journal   = {{IEICE} Transactions},
  volume    = {93-D},
  number    = {5},
  pages     = {1087--1095},
  year      = {2010},
  url       = {http://search.ieice.org/bin/summary.php?id=e93-d_5_1087},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/WangOSSK10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiLWSO10,
  author    = {Yu Sasaki and
               Yang Li and
               Lei Wang and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Non-full-active Super-Sbox Analysis: Applications to {ECHO} and Gr{\o}stl},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  pages     = {38--55},
  year      = {2010},
  crossref  = {DBLP:conf/asiacrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8_3},
  doi       = {10.1007/978-3-642-17373-8_3},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/SasakiLWSO10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cisc/OhtaharaSS10,
  author    = {Chiaki Ohtahara and
               Yu Sasaki and
               Takeshi Shimoyama},
  title     = {Preimage Attacks on Step-Reduced {RIPEMD-128} and {RIPEMD-160}},
  booktitle = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  pages     = {169--186},
  year      = {2010},
  crossref  = {DBLP:conf/cisc/2010},
  url       = {https://doi.org/10.1007/978-3-642-21518-6_13},
  doi       = {10.1007/978-3-642-21518-6_13},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/OhtaharaSS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangS10,
  author    = {Lei Wang and
               Yu Sasaki},
  title     = {Finding Preimages of Tiger Up to 23 Steps},
  booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  pages     = {116--133},
  year      = {2010},
  crossref  = {DBLP:conf/fse/2010},
  url       = {https://doi.org/10.1007/978-3-642-13858-4_7},
  doi       = {10.1007/978-3-642-13858-4_7},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/WangS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiMA10,
  author    = {Yu Sasaki and
               Florian Mendel and
               Kazumaro Aoki},
  title     = {Preimage Attacks against PKC98-Hash and {HAS-V}},
  booktitle = {Information Security and Cryptology - {ICISC} 2010 - 13th International
               Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  pages     = {68--91},
  year      = {2010},
  crossref  = {DBLP:conf/icisc/2010},
  url       = {https://doi.org/10.1007/978-3-642-24209-0_5},
  doi       = {10.1007/978-3-642-24209-0_5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/SasakiMA10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki10,
  author    = {Yu Sasaki},
  title     = {Known-Key Attacks on Rijndael with Large Blocks and Strengthening
               \emph{ShiftRow} Parameter},
  booktitle = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  pages     = {301--315},
  year      = {2010},
  crossref  = {DBLP:conf/iwsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-16825-3_20},
  doi       = {10.1007/978-3-642-16825-3_20},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/Sasaki10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/GomisawaLTFSSO10,
  author    = {Shigeto Gomisawa and
               Yang Li and
               Junko Takahashi and
               Toshinori Fukunaga and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Efficient Differential Fault Analysis for {AES}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {336},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/336},
  timestamp = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/GomisawaLTFSSO10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/YajimaINSSPKO09,
  author    = {Jun Yajima and
               Terutoshi Iwasaki and
               Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Thomas Peyrin and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision
               Search},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {1},
  pages     = {87--95},
  year      = {2009},
  url       = {http://search.ieice.org/bin/summary.php?id=e92-a_1_87&category=A&year=2009&lang=E&abst=},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/YajimaINSSPKO09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOK09,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication},
  journal   = {{IEICE} Transactions},
  volume    = {92-A},
  number    = {1},
  pages     = {96--104},
  year      = {2009},
  url       = {http://search.ieice.org/bin/summary.php?id=e92-a_1_96&category=A&year=2009&lang=E&abst=},
  timestamp = {Fri, 09 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiWOK09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiA09,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions:
               Application to {RIPEMD} and Others},
  booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  pages     = {214--231},
  year      = {2009},
  crossref  = {DBLP:conf/acisp/2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1_15},
  doi       = {10.1007/978-3-642-02620-1_15},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/SasakiA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MatusiewiczNNSS09,
  author    = {Krystian Matusiewicz and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Ivica Nikolic and
               Yu Sasaki and
               Martin Schl{\"{a}}ffer},
  title     = {Rebound Attack on the Full Lane Compression Function},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {106--125},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7_7},
  doi       = {10.1007/978-3-642-10366-7_7},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/MatusiewiczNNSS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AokiGMSW09,
  author    = {Kazumaro Aoki and
               Jian Guo and
               Krystian Matusiewicz and
               Yu Sasaki and
               Lei Wang},
  title     = {Preimages for Step-Reduced {SHA-2}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  pages     = {578--597},
  year      = {2009},
  crossref  = {DBLP:conf/asiacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7_34},
  doi       = {10.1007/978-3-642-10366-7_34},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/AokiGMSW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AokiS09,
  author    = {Kazumaro Aoki and
               Yu Sasaki},
  title     = {Meet-in-the-Middle Preimage Attacks Against Reduced {SHA-0} and {SHA-1}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  pages     = {70--89},
  year      = {2009},
  crossref  = {DBLP:conf/crypto/2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8_5},
  doi       = {10.1007/978-3-642-03356-8_5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/AokiS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SasakiA09,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Finding Preimages in Full {MD5} Faster Than Exhaustive Search},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  pages     = {134--152},
  year      = {2009},
  crossref  = {DBLP:conf/eurocrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9_8},
  doi       = {10.1007/978-3-642-01001-9_8},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/SasakiA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HongKS09,
  author    = {Deukjo Hong and
               Bonwook Koo and
               Yu Sasaki},
  title     = {Improved Preimage Attack for 68-Step {HAS-160}},
  booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International
               Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  pages     = {332--348},
  year      = {2009},
  crossref  = {DBLP:conf/icisc/2009},
  url       = {https://doi.org/10.1007/978-3-642-14423-3_22},
  doi       = {10.1007/978-3-642-14423-3_22},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/HongKS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/Sasaki09,
  author    = {Yu Sasaki},
  title     = {Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass {HAVAL}},
  booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  pages     = {79--94},
  year      = {2009},
  crossref  = {DBLP:conf/isw/2009},
  url       = {https://doi.org/10.1007/978-3-642-04474-8_7},
  doi       = {10.1007/978-3-642-04474-8_7},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isw/Sasaki09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangSSO09,
  author    = {Lei Wang and
               Yu Sasaki and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Bit-Free Collision: Application to {APOP} Attack},
  booktitle = {Advances in Information and Computer Security, 4th International Workshop
               on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  pages     = {3--21},
  year      = {2009},
  crossref  = {DBLP:conf/iwsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04846-3_2},
  doi       = {10.1007/978-3-642-04846-3_2},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/WangSSO09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Sasaki09,
  author    = {Yu Sasaki},
  title     = {Cryptanalyses of Narrow-Pipe Mode of Operation in {AURORA-512} Hash
               Function},
  booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop,
               {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
               Selected Papers},
  pages     = {36--52},
  year      = {2009},
  crossref  = {DBLP:conf/sacrypt/2009},
  url       = {https://doi.org/10.1007/978-3-642-05445-7_3},
  doi       = {10.1007/978-3-642-05445-7_3},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/Sasaki09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki09,
  author    = {Yu Sasaki},
  title     = {A Collision Attack on {AURORA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {106},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/106},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Sasaki09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki09a,
  author    = {Yu Sasaki},
  title     = {A 2nd-Preimage Attack on {AURORA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {112},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/112},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Sasaki09a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Sasaki09b,
  author    = {Yu Sasaki},
  title     = {A Full Key Recovery Attack on {HMAC-AURORA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {125},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/125},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/Sasaki09b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/MatusiewiczNNSS09,
  author    = {Krystian Matusiewicz and
               Mar{\'{\i}}a Naya{-}Plasencia and
               Ivica Nikolic and
               Yu Sasaki and
               Martin Schl{\"{a}}ffer},
  title     = {Rebound Attack on the Full {LANE} Compression Function},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {443},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/443},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/MatusiewiczNNSS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiWA09,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazumaro Aoki},
  title     = {Preimage Attacks on 41-Step {SHA-256} and 46-Step {SHA-512}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {479},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/479},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SasakiWA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWKO08,
  author    = {Yu Sasaki and
               Lei Wang and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {New Message Differences for Collision Attacks on {MD4} and {MD5}},
  journal   = {{IEICE} Transactions},
  volume    = {91-A},
  number    = {1},
  pages     = {55--63},
  year      = {2008},
  url       = {https://doi.org/10.1093/ietfec/e91-a.1.55},
  doi       = {10.1093/ietfec/e91-a.1.55},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiWKO08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiA08,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Preimage Attacks on Step-Reduced {MD5}},
  booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
               2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  pages     = {282--296},
  year      = {2008},
  crossref  = {DBLP:conf/acisp/2008},
  url       = {https://doi.org/10.1007/978-3-540-70500-0_21},
  doi       = {10.1007/978-3-540-70500-0_21},
  timestamp = {Wed, 28 Jun 2017 19:59:19 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/SasakiA08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWOK08,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {Password Recovery on Challenge and Response: Impossible Differential
               Attack on Hash Function},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  pages     = {290--307},
  year      = {2008},
  crossref  = {DBLP:conf/africacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-68164-9_20},
  doi       = {10.1007/978-3-540-68164-9_20},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/SasakiWOK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiA08,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {Preimage Attacks on 3, 4, and 5-Pass {HAVAL}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  pages     = {253--271},
  year      = {2008},
  crossref  = {DBLP:conf/asiacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7_16},
  doi       = {10.1007/978-3-540-89255-7_16},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/SasakiA08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08,
  author    = {Jun Yajima and
               Terutoshi Iwasaki and
               Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {A strict evaluation method on the number of conditions for the {SHA-1}
               collision search},
  booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  pages     = {10--20},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008asia},
  url       = {http://doi.acm.org/10.1145/1368310.1368316},
  doi       = {10.1145/1368310.1368316},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/YajimaINSSKO08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiWOK08,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {Security of {MD5} Challenge and Response: Extension of {APOP} Password
               Recovery Attack},
  booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
               the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
               Proceedings},
  pages     = {1--18},
  year      = {2008},
  crossref  = {DBLP:conf/ctrsa/2008},
  url       = {https://doi.org/10.1007/978-3-540-79263-5_1},
  doi       = {10.1007/978-3-540-79263-5_1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/SasakiWOK08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SasakiA08,
  author    = {Yu Sasaki and
               Kazumaro Aoki},
  title     = {A Preimage Attack for 52-Step {HAS-160}},
  booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  pages     = {302--317},
  year      = {2008},
  crossref  = {DBLP:conf/icisc/2008},
  url       = {https://doi.org/10.1007/978-3-642-00730-9_19},
  doi       = {10.1007/978-3-642-00730-9_19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/SasakiA08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AokiS08,
  author    = {Kazumaro Aoki and
               Yu Sasaki},
  title     = {Preimage Attacks on One-Block MD4, 63-Step {MD5} and More},
  booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  pages     = {103--119},
  year      = {2008},
  crossref  = {DBLP:conf/sacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-642-04159-4_7},
  doi       = {10.1007/978-3-642-04159-4_7},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/AokiS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiNKO07,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attacks on {MD4} and {MD5}},
  journal   = {{IEICE} Transactions},
  volume    = {90-A},
  number    = {1},
  pages     = {36--47},
  year      = {2007},
  url       = {https://doi.org/10.1093/ietfec/e90-a.1.36},
  doi       = {10.1093/ietfec/e90-a.1.36},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ieicet/SasakiNKO07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07,
  author    = {Jun Yajima and
               Yu Sasaki and
               Yusuke Naito and
               Terutoshi Iwasaki and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {A New Strategy for Finding a Differential Path of {SHA-1}},
  booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  pages     = {45--58},
  year      = {2007},
  crossref  = {DBLP:conf/acisp/2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1_4},
  doi       = {10.1007/978-3-540-73458-1_4},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/YajimaSNISKO07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiWOK07,
  author    = {Yu Sasaki and
               Lei Wang and
               Kazuo Ohta and
               Noboru Kunihiro},
  title     = {New Message Difference for {MD4}},
  booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  pages     = {329--348},
  year      = {2007},
  crossref  = {DBLP:conf/fse/2007},
  url       = {https://doi.org/10.1007/978-3-540-74619-5_21},
  doi       = {10.1007/978-3-540-74619-5_21},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/SasakiWOK07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiYA07,
  author    = {Yu Sasaki and
               Go Yamamoto and
               Kazumaro Aoki},
  title     = {Practical Password Recovery on an {MD5} Challenge and Response},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {101},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/101},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SasakiYA07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Jun Yajima and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Search for {SHA-0}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  pages     = {21--36},
  year      = {2006},
  crossref  = {DBLP:conf/asiacrypt/2006},
  url       = {https://doi.org/10.1007/11935230_2},
  doi       = {10.1007/11935230_2},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/NaitoSSYKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Jun Yajima and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {How to Construct Sufficient Conditions for Hash Functions},
  booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  pages     = {243--259},
  year      = {2006},
  crossref  = {DBLP:conf/vietcrypt/2006},
  url       = {https://doi.org/10.1007/11958239_16},
  doi       = {10.1007/11958239_16},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/vietcrypt/SasakiNYSKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSSYKO06,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Takeshi Shimoyama and
               Jun Yajima and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Message Modification for Step 21-23 on {SHA-0}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {16},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/016},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NaitoSSYKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNYSKO06,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Jun Yajima and
               Takeshi Shimoyama and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {How to Construct Sufficient Condition in Searching Collisions of {MD5}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {74},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/074},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SasakiNYSKO06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NaitoSKO05,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attack on {MD4} with Probability Almost 1},
  booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  pages     = {129--145},
  year      = {2005},
  crossref  = {DBLP:conf/icisc/2005},
  url       = {https://doi.org/10.1007/11734727_12},
  doi       = {10.1007/11734727_12},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/NaitoSKO05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSKO05,
  author    = {Yusuke Naito and
               Yu Sasaki and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attack on {MD4}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {151},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/151},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/NaitoSKO05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNKO05,
  author    = {Yu Sasaki and
               Yusuke Naito and
               Noboru Kunihiro and
               Kazuo Ohta},
  title     = {Improved Collision Attack on {MD5}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {400},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/400},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/iacr/SasakiNKO05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ches/2017,
  editor    = {Wieland Fischer and
               Naofumi Homma},
  title     = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
               Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10529},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66787-4},
  doi       = {10.1007/978-3-319-66787-4},
  isbn      = {978-3-319-66786-7},
  timestamp = {Mon, 18 Sep 2017 13:22:01 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ches/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-3,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10212},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56617-7},
  doi       = {10.1007/978-3-319-56617-7},
  isbn      = {978-3-319-56616-0},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2017-3},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2017,
  editor    = {Phong Q. Nguyen and
               Jianying Zhou},
  title     = {Information Security - 20th International Conference, {ISC} 2017,
               Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10599},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-69659-1},
  doi       = {10.1007/978-3-319-69659-1},
  isbn      = {978-3-319-69658-4},
  timestamp = {Mon, 13 Nov 2017 18:16:01 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/isw/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2017,
  editor    = {Satoshi Obana and
               Koji Chida},
  title     = {Advances in Information and Computer Security - 12th International
               Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
               September 1, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10418},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-64200-0},
  doi       = {10.1007/978-3-319-64200-0},
  isbn      = {978-3-319-64199-7},
  timestamp = {Tue, 15 Aug 2017 08:03:31 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secitc/2017,
  editor    = {Pooya Farshim and
               Emil Simion},
  title     = {Innovative Security Solutions for Information Technology and Communications
               - 10th International Conference, SecITC 2017, Bucharest, Romania,
               June 8-9, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10543},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-69284-5},
  doi       = {10.1007/978-3-319-69284-5},
  isbn      = {978-3-319-69283-8},
  timestamp = {Thu, 02 Nov 2017 17:03:56 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/secitc/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-2,
  editor    = {Joseph K. Liu and
               Ron Steinfeld},
  title     = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
               2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9723},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-40367-0},
  doi       = {10.1007/978-3-319-40367-0},
  isbn      = {978-3-319-40366-3},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2016,
  editor    = {Mark Manulis and
               Ahmad{-}Reza Sadeghi and
               Steve Schneider},
  title     = {Applied Cryptography and Network Security - 14th International Conference,
               {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9696},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-39555-5},
  doi       = {10.1007/978-3-319-39555-5},
  isbn      = {978-3-319-39554-8},
  timestamp = {Tue, 23 May 2017 01:13:09 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-2,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10032},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53890-6},
  doi       = {10.1007/978-3-662-53890-6},
  isbn      = {978-3-662-53889-0},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-1,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10031},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53887-6},
  doi       = {10.1007/978-3-662-53887-6},
  isbn      = {978-3-662-53886-9},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2016-2,
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9815},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53008-5},
  doi       = {10.1007/978-3-662-53008-5},
  isbn      = {978-3-662-53007-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2016,
  editor    = {Thomas Peyrin},
  title     = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
               Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9783},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-52993-5},
  doi       = {10.1007/978-3-662-52993-5},
  isbn      = {978-3-662-52992-8},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2016,
  editor    = {Roberto Avanzi and
               Howard M. Heys},
  title     = {Selected Areas in Cryptography - {SAC} 2016 - 23rd International Conference,
               St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10532},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-69453-5},
  doi       = {10.1007/978-3-319-69453-5},
  isbn      = {978-3-319-69452-8},
  timestamp = {Fri, 20 Oct 2017 13:43:28 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-2,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3},
  doi       = {10.1007/978-3-662-48800-3},
  isbn      = {978-3-662-48799-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2015-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2015,
  editor    = {Kaisa Nyberg},
  title     = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
               the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9048},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16715-2},
  doi       = {10.1007/978-3-319-16715-2},
  isbn      = {978-3-319-16714-5},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2015,
  editor    = {Orr Dunkelman and
               Liam Keliher},
  title     = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9566},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-31301-6},
  doi       = {10.1007/978-3-319-31301-6},
  isbn      = {978-3-319-31300-9},
  timestamp = {Sun, 21 May 2017 00:19:12 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2014,
  editor    = {Ioana Boureanu and
               Philippe Owesarski and
               Serge Vaudenay},
  title     = {Applied Cryptography and Network Security - 12th International Conference,
               {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8479},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-07536-5},
  doi       = {10.1007/978-3-319-07536-5},
  isbn      = {978-3-319-07535-8},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014-1,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45611-8},
  doi       = {10.1007/978-3-662-45611-8},
  isbn      = {978-3-662-45610-1},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cans/2014,
  editor    = {Dimitris Gritzalis and
               Aggelos Kiayias and
               Ioannis G. Askoxylakis},
  title     = {Cryptology and Network Security - 13th International Conference, {CANS}
               2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8813},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12280-9},
  doi       = {10.1007/978-3-319-12280-9},
  isbn      = {978-3-319-12279-3},
  timestamp = {Wed, 24 May 2017 08:27:40 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cans/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2014,
  editor    = {Josh Benaloh},
  title     = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
               the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
               2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8366},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-04852-9},
  doi       = {10.1007/978-3-319-04852-9},
  isbn      = {978-3-319-04851-2},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2014,
  editor    = {Carlos Cid and
               Christian Rechberger},
  title     = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
               London, UK, March 3-5, 2014. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8540},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46706-0},
  doi       = {10.1007/978-3-662-46706-0},
  isbn      = {978-3-662-46705-3},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2014,
  editor    = {Willi Meier and
               Debdeep Mukhopadhyay},
  title     = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
               on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8885},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13039-2},
  doi       = {10.1007/978-3-319-13039-2},
  isbn      = {978-3-319-13038-5},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2014,
  editor    = {Antoine Joux and
               Amr M. Youssef},
  title     = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
               Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8781},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13051-4},
  doi       = {10.1007/978-3-319-13051-4},
  isbn      = {978-3-319-13050-7},
  timestamp = {Sun, 21 May 2017 00:19:12 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/scn/2014,
  editor    = {Michel Abdalla and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8642},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7},
  doi       = {10.1007/978-3-319-10879-7},
  isbn      = {978-3-319-10878-0},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/scn/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2013,
  editor    = {Colin Boyd and
               Leonie Simpson},
  title     = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7959},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3},
  doi       = {10.1007/978-3-642-39059-3},
  isbn      = {978-3-642-39058-6},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2013,
  editor    = {Michael J. Jacobson Jr. and
               Michael E. Locasto and
               Payman Mohassel and
               Reihaneh Safavi{-}Naini},
  title     = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7954},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1},
  doi       = {10.1007/978-3-642-38980-1},
  isbn      = {978-3-642-38979-5},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-2,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8270},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42045-0},
  doi       = {10.1007/978-3-642-42045-0},
  isbn      = {978-3-642-42044-3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2013-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2013,
  editor    = {Ahmad{-}Reza Sadeghi},
  title     = {Financial Cryptography and Data Security - 17th International Conference,
               {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7859},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39884-1},
  doi       = {10.1007/978-3-642-39884-1},
  isbn      = {978-3-642-39883-4},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2013,
  editor    = {Hyang{-}Sook Lee and
               Dong{-}Guk Han},
  title     = {Information Security and Cryptology - {ICISC} 2013 - 16th International
               Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8565},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12160-4},
  doi       = {10.1007/978-3-319-12160-4},
  isbn      = {978-3-319-12159-8},
  timestamp = {Fri, 26 May 2017 00:51:03 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2013,
  editor    = {Kazuo Sakiyama and
               Masayuki Terada},
  title     = {Advances in Information and Computer Security - 8th International
               Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
               2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8231},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41383-4},
  doi       = {10.1007/978-3-642-41383-4},
  isbn      = {978-3-642-41382-7},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2013,
  editor    = {Tanja Lange and
               Kristin E. Lauter and
               Petr Lisonek},
  title     = {Selected Areas in Cryptography - {SAC} 2013 - 20th International Conference,
               Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8282},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43414-7},
  doi       = {10.1007/978-3-662-43414-7},
  isbn      = {978-3-662-43413-0},
  timestamp = {Mon, 25 Sep 2017 10:36:35 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor    = {Pierangela Samarati},
  title     = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  publisher = {SciTePress},
  year      = {2013},
  isbn      = {978-989-8565-73-0},
  timestamp = {Tue, 05 Nov 2013 12:35:25 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2012,
  editor    = {Willy Susilo and
               Yi Mu and
               Jennifer Seberry},
  title     = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
               2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7372},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31448-3},
  doi       = {10.1007/978-3-642-31448-3},
  isbn      = {978-3-642-31447-6},
  timestamp = {Thu, 15 Jun 2017 21:41:12 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2012,
  editor    = {Feng Bao and
               Pierangela Samarati and
               Jianying Zhou},
  title     = {Applied Cryptography and Network Security - 10th International Conference,
               {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7341},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31284-7},
  doi       = {10.1007/978-3-642-31284-7},
  isbn      = {978-3-642-31283-0},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/acns/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2012,
  editor    = {Aikaterini Mitrokotsa and
               Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
               on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7374},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31410-0},
  doi       = {10.1007/978-3-642-31410-0},
  isbn      = {978-3-642-31409-4},
  timestamp = {Mon, 29 May 2017 13:41:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2012,
  editor    = {David Pointcheval and
               Thomas Johansson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cambridge, UK, April 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7237},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29011-4},
  doi       = {10.1007/978-3-642-29011-4},
  isbn      = {978-3-642-29010-7},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2012,
  editor    = {Taekyoung Kwon and
               Mun{-}Kyu Lee and
               Daesung Kwon},
  title     = {Information Security and Cryptology - {ICISC} 2012 - 15th International
               Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7839},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-37682-5},
  doi       = {10.1007/978-3-642-37682-5},
  isbn      = {978-3-642-37681-8},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2012,
  editor    = {Steven D. Galbraith and
               Mridul Nandi},
  title     = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
               on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7668},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34931-7},
  doi       = {10.1007/978-3-642-34931-7},
  isbn      = {978-3-642-34930-0},
  timestamp = {Fri, 19 May 2017 01:26:37 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/indocrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor    = {Mark Dermot Ryan and
               Ben Smyth and
               Guilin Wang},
  title     = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7232},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2},
  doi       = {10.1007/978-3-642-29101-2},
  isbn      = {978-3-642-29100-5},
  timestamp = {Sun, 21 May 2017 00:18:03 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ispec/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2012,
  editor    = {Goichiro Hanaoka and
               Toshihiro Yamauchi},
  title     = {Advances in Information and Computer Security - 7th International
               Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
               2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7631},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34117-5},
  doi       = {10.1007/978-3-642-34117-5},
  isbn      = {978-3-642-34116-8},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2012,
  editor    = {Lars R. Knudsen and
               Huapeng Wu},
  title     = {Selected Areas in Cryptography, 19th International Conference, {SAC}
               2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7707},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-35999-6},
  doi       = {10.1007/978-3-642-35999-6},
  isbn      = {978-3-642-35998-9},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2011,
  editor    = {Udaya Parampalli and
               Philip Hawkes},
  title     = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
               2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6812},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22497-3},
  doi       = {10.1007/978-3-642-22497-3},
  isbn      = {978-3-642-22496-6},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2011,
  editor    = {Abderrahmane Nitaj and
               David Pointcheval},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference
               on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6737},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21969-6},
  doi       = {10.1007/978-3-642-21969-6},
  isbn      = {978-3-642-21968-9},
  timestamp = {Mon, 22 May 2017 17:11:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2011,
  editor    = {Aggelos Kiayias},
  title     = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
               the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
               2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6558},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19074-2},
  doi       = {10.1007/978-3-642-19074-2},
  isbn      = {978-3-642-19073-5},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2011,
  editor    = {Antoine Joux},
  title     = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
               Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6733},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21702-9},
  doi       = {10.1007/978-3-642-21702-9},
  isbn      = {978-3-642-21701-2},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2011,
  editor    = {Howon Kim},
  title     = {Information Security and Cryptology - {ICISC} 2011 - 14th International
               Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7259},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31912-9},
  doi       = {10.1007/978-3-642-31912-9},
  isbn      = {978-3-642-31911-2},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2011,
  editor    = {Tetsu Iwata and
               Masakatsu Nishigaki},
  title     = {Advances in Information and Computer Security - 6th International
               Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7038},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25141-2},
  doi       = {10.1007/978-3-642-25141-2},
  isbn      = {978-3-642-25140-5},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2011,
  editor    = {Ali Miri and
               Serge Vaudenay},
  title     = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
               2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7118},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28496-0},
  doi       = {10.1007/978-3-642-28496-0},
  isbn      = {978-3-642-28495-3},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2011,
  editor    = {Javier Lopez and
               Pierangela Samarati},
  title     = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
               and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {SciTePress},
  year      = {2011},
  isbn      = {978-989-8425-71-3},
  timestamp = {Thu, 27 Oct 2011 10:35:32 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/secrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wisa/2011,
  editor    = {Souhwan Jung and
               Moti Yung},
  title     = {Information Security Applications - 12th International Workshop, {WISA}
               2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7115},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-27890-7},
  doi       = {10.1007/978-3-642-27890-7},
  isbn      = {978-3-642-27889-1},
  timestamp = {Sun, 21 May 2017 00:17:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/wisa/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2010,
  editor    = {Masayuki Abe},
  title     = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Singapore, December 5-9, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6477},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17373-8},
  doi       = {10.1007/978-3-642-17373-8},
  isbn      = {978-3-642-17372-1},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cisc/2010,
  editor    = {Xuejia Lai and
               Moti Yung and
               Dongdai Lin},
  title     = {Information Security and Cryptology - 6th International Conference,
               Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6584},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21518-6},
  doi       = {10.1007/978-3-642-21518-6},
  isbn      = {978-3-642-21517-9},
  timestamp = {Mon, 22 May 2017 17:10:59 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/cisc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2010,
  editor    = {Seokhie Hong and
               Tetsu Iwata},
  title     = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
               Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6147},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13858-4},
  doi       = {10.1007/978-3-642-13858-4},
  isbn      = {978-3-642-13857-7},
  timestamp = {Tue, 23 May 2017 01:12:11 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2010,
  editor    = {Kyung Hyune Rhee and
               DaeHun Nyang},
  title     = {Information Security and Cryptology - {ICISC} 2010 - 13th International
               Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6829},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24209-0},
  doi       = {10.1007/978-3-642-24209-0},
  isbn      = {978-3-642-24208-3},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor    = {Isao Echizen and
               Noboru Kunihiro and
               Ry{\^{o}}ichi Sasaki},
  title     = {Advances in Information and Computer Security - 5th International
               Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6434},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-16825-3},
  doi       = {10.1007/978-3-642-16825-3},
  isbn      = {978-3-642-16824-6},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2009,
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
               2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5594},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02620-1},
  doi       = {10.1007/978-3-642-02620-1},
  isbn      = {978-3-642-02619-5},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2009,
  editor    = {Mitsuru Matsui},
  title     = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Tokyo, Japan, December 6-10, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5912},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-10366-7},
  doi       = {10.1007/978-3-642-10366-7},
  isbn      = {978-3-642-10365-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2009,
  editor    = {Shai Halevi},
  title     = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5677},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8},
  doi       = {10.1007/978-3-642-03356-8},
  isbn      = {978-3-642-03355-1},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2009,
  editor    = {Antoine Joux},
  title     = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5479},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9},
  doi       = {10.1007/978-3-642-01001-9},
  isbn      = {978-3-642-01000-2},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2009,
  editor    = {Dong Hoon Lee and
               Seokhie Hong},
  title     = {Information, Security and Cryptology - {ICISC} 2009, 12th International
               Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5984},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14423-3},
  doi       = {10.1007/978-3-642-14423-3},
  isbn      = {978-3-642-14422-6},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2009,
  editor    = {Pierangela Samarati and
               Moti Yung and
               Fabio Martinelli and
               Claudio Agostino Ardagna},
  title     = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5735},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04474-8},
  doi       = {10.1007/978-3-642-04474-8},
  isbn      = {978-3-642-04473-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isw/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2009,
  editor    = {Tsuyoshi Takagi and
               Masahiro Mambo},
  title     = {Advances in Information and Computer Security, 4th International Workshop
               on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5824},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04846-3},
  doi       = {10.1007/978-3-642-04846-3},
  isbn      = {978-3-642-04845-6},
  timestamp = {Wed, 24 May 2017 08:27:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/iwsec/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2009,
  editor    = {Michael J. Jacobson Jr. and
               Vincent Rijmen and
               Reihaneh Safavi{-}Naini},
  title     = {Selected Areas in Cryptography, 16th Annual International Workshop,
               {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5867},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-05445-7},
  doi       = {10.1007/978-3-642-05445-7},
  isbn      = {978-3-642-05443-3},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2008,
  editor    = {Yi Mu and
               Willy Susilo and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
               2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5107},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70500-0},
  doi       = {10.1007/978-3-540-70500-0},
  isbn      = {978-3-540-69971-2},
  timestamp = {Wed, 28 Jun 2017 19:59:19 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2008,
  editor    = {Serge Vaudenay},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
               on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5023},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-68164-9},
  doi       = {10.1007/978-3-540-68164-9},
  isbn      = {978-3-540-68159-5},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/africacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2008,
  editor    = {Josef Pieprzyk},
  title     = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5350},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7},
  doi       = {10.1007/978-3-540-89255-7},
  isbn      = {978-3-540-89254-0},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008asia,
  editor    = {Masayuki Abe and
               Virgil D. Gligor},
  title     = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-979-1},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/ccs/2008asia},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2008,
  editor    = {Tal Malkin},
  title     = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
               the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4964},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-79263-5},
  doi       = {10.1007/978-3-540-79263-5},
  isbn      = {978-3-540-79262-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ctrsa/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2008,
  editor    = {Pil Joong Lee and
               Jung Hee Cheon},
  title     = {Information Security and Cryptology - {ICISC} 2008, 11th International
               Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5461},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00730-9},
  doi       = {10.1007/978-3-642-00730-9},
  isbn      = {978-3-642-00729-3},
  timestamp = {Fri, 26 May 2017 00:51:04 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2008,
  editor    = {Roberto Maria Avanzi and
               Liam Keliher and
               Francesco Sica},
  title     = {Selected Areas in Cryptography, 15th International Workshop, {SAC}
               2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5381},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04159-4},
  doi       = {10.1007/978-3-642-04159-4},
  isbn      = {978-3-642-04158-7},
  timestamp = {Sun, 21 May 2017 00:19:13 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/sacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2007,
  editor    = {Josef Pieprzyk and
               Hossein Ghodosi and
               Ed Dawson},
  title     = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
               2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4586},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73458-1},
  doi       = {10.1007/978-3-540-73458-1},
  isbn      = {978-3-540-73457-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/acisp/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2007,
  editor    = {Alex Biryukov},
  title     = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
               Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4593},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74619-5},
  doi       = {10.1007/978-3-540-74619-5},
  isbn      = {978-3-540-74617-1},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/fse/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2006,
  editor    = {Xuejia Lai and
               Kefei Chen},
  title     = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Shanghai, China, December 3-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4284},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11935230},
  doi       = {10.1007/11935230},
  isbn      = {3-540-49475-8},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/asiacrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/vietcrypt/2006,
  editor    = {Phong Q. Nguyen},
  title     = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conferenceon
               Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4341},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11958239},
  doi       = {10.1007/11958239},
  isbn      = {3-540-68799-8},
  timestamp = {Fri, 19 May 2017 01:25:57 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/vietcrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icisc/2005,
  editor    = {Dongho Won and
               Seungjoo Kim},
  title     = {Information Security and Cryptology - {ICISC} 2005, 8th International
               Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3935},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11734727},
  doi       = {10.1007/11734727},
  isbn      = {3-540-33354-1},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icisc/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier