Yu Sasaki Coauthor index pubzone.org

Facets and more with CompleteSearch

Listing of the DBLP Bibliography Server - FAQ
Other views (modern): by type - by year
Other mirrors: Trier II - Dagstuhl


Ask others: ACM DL/Guide - CiteSeerx - CSB - MetaPress - Google - Bing - Yahoo
DBLP keys2017
i31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShoichi Hirose, Yu Sasaki, Kan Yasuda: Message-Recovery MACs and Verification-Unskippable AE. IACR Cryptology ePrint Archive 2017: 260 (2017)
i30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAnne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens: Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. IACR Cryptology ePrint Archive 2017: 478 (2017)
c80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yosuke Todo: New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers. EUROCRYPT (3) 2017: 185-215
2016
j27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki: Extended meet-in-the-middle attacks on some Feistel constructions. Des. Codes Cryptography 80(3): 587-618 (2016)
i29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIvica Nikolic, Yu Sasaki: Refinements of the k-tree Algorithm for the Generalized Birthday Problem. IACR Cryptology ePrint Archive 2016: 312 (2016)
i28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki: Cryptanalysis of Reduced NORX. IACR Cryptology ePrint Archive 2016: 436 (2016)
i27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKota Kondo, Yu Sasaki, Tetsu Iwata: On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IACR Cryptology ePrint Archive 2016: 625 (2016)
i26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim: The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptology ePrint Archive 2016: 660 (2016)
i25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYosuke Todo, Gregor Leander, Yu Sasaki: Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptology ePrint Archive 2016: 732 (2016)
i24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIvica Nikolic, Yu Sasaki: A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. IACR Cryptology ePrint Archive 2016: 851 (2016)
i23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki, Siang Meng Sim: Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Cryptology ePrint Archive 2016: 973 (2016)
i22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki: Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Cryptology ePrint Archive 2016: 1162 (2016)
i21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yosuke Todo: New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. IACR Cryptology ePrint Archive 2016: 1181 (2016)
j26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. IEICE Transactions 99-A(1): 22-30 (2016)
j25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang: Practical Forgeries and Distinguishers against PAES. IEICE Transactions 99-A(1): 39-48 (2016)
j24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Message Extension Attack against Authenticated Encryptions: Application to PANDA. IEICE Transactions 99-A(1): 49-57 (2016)
j23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim: Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Trans. Symmetric Cryptol. 2016(1): 33-56 (2016)
j22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki: Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Trans. Symmetric Cryptol. 2016(2): 307-337 (2016)
c79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNasour Bagheri, Florian Mendel, Yu Sasaki: Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP (2) 2016: 301-316
c78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKota Kondo, Yu Sasaki, Tetsu Iwata: On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. ACNS 2016: 518-536
c77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYosuke Todo, Gregor Leander, Yu Sasaki: Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33
c76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIvica Nikolic, Yu Sasaki: A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. ASIACRYPT (1) 2016: 627-647
c75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153
c74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki: Cryptanalysis of Reduced NORX. FSE 2016: 554-574
2015
b1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKazuo Sakiyama, Yu Sasaki, Yang Li: Security of Block Ciphers - From Algorithm Design to Hardware Implementation. Wiley 2015, ISBN 978-1-118-66001-0, pp. I-XII, 1-295
i20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen: Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. IACR Cryptology ePrint Archive 2015: 75 (2015)
i19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Yu Sasaki, Lei Wang, Shuang Wu: Cryptanalysis of HMAC/NMAC-Whirlpool. IACR Cryptology ePrint Archive 2015: 149 (2015)
i18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Jérémy Jean, Ivica Nikolic, Kexin Qiao, Yu Sasaki, Siang Meng Sim: Invariant Subspace Attack Against Full Midori64. IACR Cryptology ePrint Archive 2015: 1189 (2015)
j21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Gaoli Wang, Lei Wang: Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Transactions 98-A(1): 26-38 (2015)
j20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Bitwise Partial-Sum: A New Tool for Integral Analysis against ARX Designs. IEICE Transactions 98-A(1): 49-60 (2015)
j19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. IEICE Transactions 98-A(1): 61-71 (2015)
c73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIvica Nikolic, Yu Sasaki: Refinements of the k-tree Algorithm for the Generalized Birthday Problem. ASIACRYPT (2) 2015: 683-703
c72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kan Yasuda: How to Incorporate Associated Data in Sponge-Based Authenticated Encryption. CT-RSA 2015: 353-370
c71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kan Yasuda: A New Mode of Operation for Incremental Authenticated Encryption with Associated Data. SAC 2015: 397-416
c70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJérémy Jean, Yu Sasaki, Lei Wang: Analysis of the CAESAR Candidate Silver. SAC 2015: 493-509
2014
i17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: A Forgery Attack against PANDA-s. IACR Cryptology ePrint Archive 2014: 217 (2014)
i16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: A Practical Universal Forgery Attack against PAES-8. IACR Cryptology ePrint Archive 2014: 218 (2014)
i15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo: Cryptanalysis of Reduced-round SIMON32 and SIMON48. IACR Cryptology ePrint Archive 2014: 761 (2014)
j18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Comprehensive Study of Integral Analysis on LBlock. IEICE Transactions 97-A(1): 127-138 (2014)
j17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks. IEICE Transactions 97-A(1): 167-176 (2014)
j16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160. IEICE Transactions 97-A(1): 177-190 (2014)
c69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. ACNS 2014: 253-270
c68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki: Meet-in-the-Middle Attacks on Generic Feistel Constructions. ASIACRYPT (1) 2014: 458-477
c67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Message Extension Attack against Authenticated Encryptions: Application to PANDA. CANS 2014: 82-97
c66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Thomas Peyrin, Yu Sasaki, Lei Wang: Updates on Generic Attacks against HMAC and NMAC. CRYPTO (1) 2014: 131-148
c65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta: An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. CT-RSA 2014: 424-443
c64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen: Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. FSE 2014: 571-590
c63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLQingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo: Cryptanalysis of Reduced-Round SIMON32 and SIMON48. INDOCRYPT 2014: 143-160
c62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang: Practical Cryptanalysis of PAES. Selected Areas in Cryptography 2014: 228-242
c61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. SCN 2014: 324-339
2013
i14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMitsugu Iwamoto, Thomas Peyrin, Yu Sasaki: Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful. IACR Cryptology ePrint Archive 2013: 611 (2013)
j15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. IEICE Transactions 96-A(1): 121-130 (2013)
j14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function. IEICE Transactions 96-A(1): 131-140 (2013)
j13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kazumaro Aoki: Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta. IEICE Transactions 96-A(1): 141-149 (2013)
c60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakanori Isobe, Yu Sasaki, Jiageng Chen: Related-Key Boomerang Attacks on KATAN32/48/64. ACISP 2013: 268-285
c59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. ACNS 2013: 170-185
c58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJian Guo, Yu Sasaki, Lei Wang, Shuang Wu: Cryptanalysis of HMAC/NMAC-Whirlpool. ASIACRYPT (2) 2013: 21-40
c57Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMitsugu Iwamoto, Thomas Peyrin, Yu Sasaki: Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful. ASIACRYPT (2) 2013: 504-523
c56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yang Li, Hikaru Sakamoto, Kazuo Sakiyama: Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections. Financial Cryptography 2013: 213-220
c55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs. ICISC 2013: 189-202
c54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Yu Sasaki, Lei Wang, Kan Yasuda: Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. IWSEC 2013: 83-98
c53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYosuke Todo, Yu Sasaki: New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA. IWSEC 2013: 99-114
c52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Selected Areas in Cryptography 2013: 493-512
c51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta: Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. SECRYPT 2013: 111-122
2012
i13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: 2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160. IACR Cryptology ePrint Archive 2012: 49 (2012)
i12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThomas Peyrin, Yu Sasaki, Lei Wang: Generic Related-key Attacks for HMAC. IACR Cryptology ePrint Archive 2012: 684 (2012)
j12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter. IEICE Transactions 95-A(1): 21-28 (2012)
j11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta: Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. IEICE Transactions 95-A(1): 100-110 (2012)
j10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Florian Mendel, Kazumaro Aoki: Preimage Attacks against PKC98-Hash and HAS-V. IEICE Transactions 95-A(1): 111-124 (2012)
j9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama: Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160. IEICE Transactions 95-A(10): 1729-1739 (2012)
c50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar: Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. ACISP 2012: 87-100
c49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. ACNS 2012: 275-292
c48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta: Three-Subset Meet-in-the-Middle Attack on Reduced XTEA. AFRICACRYPT 2012: 138-154
c47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Shuang Wu, Wenling Wu: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. ASIACRYPT 2012: 562-579
c46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLThomas Peyrin, Yu Sasaki, Lei Wang: Generic Related-Key Attacks for HMAC. ASIACRYPT 2012: 580-597
c45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks. EUROCRYPT 2012: 411-427
c44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Comprehensive Study of Integral Analysis on 22-Round LBlock. ICISC 2012: 156-169
c43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakuma Koyama, Yu Sasaki, Noboru Kunihiro: Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties. ICISC 2012: 352-367
c42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLToshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama: Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. ICISC 2012: 395-409
c41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds. INDOCRYPT 2012: 265-282
c40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTakuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta: New Truncated Differential Cryptanalysis on 3D Block Cipher. ISPEC 2012: 109-125
c39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta: Boomerang Distinguishers for Full HAS-160 Compression Function. IWSEC 2012: 156-169
c38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta: Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. IWSEC 2012: 170-181
c37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang: Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers. Selected Areas in Cryptography 2012: 234-251
2011
j8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki: Preimage Attack on 23-Step Tiger. IEICE Transactions 94-A(1): 110-120 (2011)
j7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Cryptanalyses of Double-Mix Merkle-Damgård Mode in the Original Version of AURORA-512. IEICE Transactions 94-A(1): 121-128 (2011)
c36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama: Preimage Attacks on Full-ARIRANG (Poster). ACISP 2011: 417-422
c35Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Collisions of MMO-MD5 and Their Impact on Original MD5. AFRICACRYPT 2011: 117-133
c34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama: (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. CT-RSA 2011: 197-212
c33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. FSE 2011: 378-396
c32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kan Yasuda: Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes. FSE 2011: 397-415
c31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kazumaro Aoki: Improved Integral Analysis on Tweaked Lesamnta. ICISC 2011: 1-17
c30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta: Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity. IWSEC 2011: 178-192
c29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. Selected Areas in Cryptography 2011: 1-18
c28no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer: Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. SECRYPT 2011: 124-133
c27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama: Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward. WISA 2011: 40-54
2010
i11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta: Efficient Differential Fault Analysis for AES. IACR Cryptology ePrint Archive 2010: 336 (2010)
j6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro: Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Transactions 93-A(1): 84-92 (2010)
j5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro: Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Transactions 93-D(5): 1087-1095 (2010)
c26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yang Li, Lei Wang, Kazuo Sakiyama, Kazuo Ohta: Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl. ASIACRYPT 2010: 38-55
c25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama: Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. Inscrypt 2010: 169-186
c24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki: Finding Preimages of Tiger Up to 23 Steps. FSE 2010: 116-133
c23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Florian Mendel, Kazumaro Aoki: Preimage Attacks against PKC98-Hash and HAS-V. ICISC 2010: 68-91
c22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter. IWSEC 2010: 301-315
2009
i10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: A Collision Attack on AURORA-512. IACR Cryptology ePrint Archive 2009: 106 (2009)
i9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: A 2nd-Preimage Attack on AURORA-512. IACR Cryptology ePrint Archive 2009: 112 (2009)
i8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: A Full Key Recovery Attack on HMAC-AURORA-512. IACR Cryptology ePrint Archive 2009: 125 (2009)
i7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKrystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer: Rebound Attack on the Full LANE Compression Function. IACR Cryptology ePrint Archive 2009: 443 (2009)
i6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazumaro Aoki: Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. IACR Cryptology ePrint Archive 2009: 479 (2009)
j4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro, Kazuo Ohta: A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search. IEICE Transactions 92-A(1): 87-95 (2009)
j3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication. IEICE Transactions 92-A(1): 96-104 (2009)
c21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kazumaro Aoki: Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. ACISP 2009: 214-231
c20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKrystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer: Rebound Attack on the Full Lane Compression Function. ASIACRYPT 2009: 106-125
c19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, Lei Wang: Preimages for Step-Reduced SHA-2. ASIACRYPT 2009: 578-597
c18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKazumaro Aoki, Yu Sasaki: Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. CRYPTO 2009: 70-89
c17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kazumaro Aoki: Finding Preimages in Full MD5 Faster Than Exhaustive Search. EUROCRYPT 2009: 134-152
c16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDeukjo Hong, Bonwook Koo, Yu Sasaki: Improved Preimage Attack for 68-Step HAS-160. ICISC 2009: 332-348
c15Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. ISC 2009: 79-94
c14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta: Bit-Free Collision: Application to APOP Attack. IWSEC 2009: 3-21
c13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki: Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. Selected Areas in Cryptography 2009: 36-52
2008
j2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Noboru Kunihiro, Kazuo Ohta: New Message Differences for Collision Attacks on MD4 and MD5. IEICE Transactions 91-A(1): 55-63 (2008)
c12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kazumaro Aoki: Preimage Attacks on Step-Reduced MD5. ACISP 2008: 282-296
c11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. AFRICACRYPT 2008: 290-307
c10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kazumaro Aoki: Preimage Attacks on 3, 4, and 5-Pass HAVAL. ASIACRYPT 2008: 253-271
c9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta: A strict evaluation method on the number of conditions for the SHA-1 collision search. ASIACCS 2008: 10-20
c8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. CT-RSA 2008: 1-18
c7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Kazumaro Aoki: A Preimage Attack for 52-Step HAS-160. ICISC 2008: 302-317
c6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLKazumaro Aoki, Yu Sasaki: Preimage Attacks on One-Block MD4, 63-Step MD5 and More. Selected Areas in Cryptography 2008: 103-119
2007
i5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Go Yamamoto, Kazumaro Aoki: Practical Password Recovery on an MD5 Challenge and Response. IACR Cryptology ePrint Archive 2007: 101 (2007)
j1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta: Improved Collision Attacks on MD4 and MD5. IEICE Transactions 90-A(1): 36-47 (2007)
c5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta: A New Strategy for Finding a Differential Path of SHA-1. ACISP 2007: 45-58
c4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro: New Message Difference for MD4. FSE 2007: 329-348
2006
i4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta: Message Modification for Step 21-23 on SHA-0. IACR Cryptology ePrint Archive 2006: 16 (2006)
i3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta: How to Construct Sufficient Condition in Searching Collisions of MD5. IACR Cryptology ePrint Archive 2006: 74 (2006)
c3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta: Improved Collision Search for SHA-0. ASIACRYPT 2006: 21-36
c2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta: How to Construct Sufficient Conditions for Hash Functions. VIETCRYPT 2006: 243-259
2005
i2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta: Improved Collision Attack on MD4. IACR Cryptology ePrint Archive 2005: 151 (2005)
i1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta: Improved Collision Attack on MD5. IACR Cryptology ePrint Archive 2005: 400 (2005)
c1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta: Improved Collision Attack on MD4 with Probability Almost 1. ICISC 2005: 129-145

Coauthor Index

1Kazumaro Aoki[j13] [j10] [c31] [c28] [j6] [c23] [i6] [c21] [c19] [c18] [c17] [c12] [c10] [c7] [c6] [i5]
2Nasour Bagheri[i28] [c79] [c74]
3Christof Beierle[i26] [c75]
4Anne Canteaut[i30]
5Jiageng Chen[c60]
6Sareh Emami[c50]
7Toshinori Fukunaga[i11]
8Shigeto Gomisawa[i11]
9Jian Guo 0001[j27] [i23] [i22] [j23] [j22] [i20] [i19] [i18] [c68] [c66] [c64] [c58] [c19]
10Shoichi Hirose[i31]
11Deukjo Hong[c50] [c16]
12Tao Huang[i28] [c74]
13Takanori Isobe[c60]
14Mitsugu Iwamoto[c65] [i14] [c57] [c51] [c42]
15Terutoshi Iwasaki[j4] [c9] [c5]
16Tetsu Iwata[i27] [c78]
17Jérémy Jean[j27] [i26] [i23] [i22] [j25] [j23] [j22] [c75] [i18] [c70] [c68] [c62]
18Keting Jia[i28] [c74]
19Stefan Kölbl[i26] [c75]
20Wataru Komatsubara[c51] [j11] [c34]
21Kota Kondo[i27] [c78]
22Bonwook Koo[c16]
23Takuma Koyama[c43] [c40]
24Ashish Kumar[c50]
25Noboru Kunihiro[c43] [j6] [j5] [j4] [j3] [j2] [c11] [c9] [c8] [j1] [c5] [c4] [i4] [i3] [c3] [c2] [i2] [i1] [c1]
26Eran Lambooij[i30]
27Gregor Leander[i26] [i25] [c77] [c75]
28Yang Li 0001[b1] [c56] [c42] [i11] [c26]
29Zhiqiang Liu[i15] [c63]
30Krystian Matusiewicz[i7] [c20] [c19]
31Florian Mendel[i28] [c79] [c74] [j10] [c23]
32Amir Moradi 0001[i26] [c75]
33Yusuke Naito[c54] [j4] [c9] [j1] [c5] [i4] [i3] [c3] [c2] [i2] [i1] [c1]
34Toshiki Nakasone[c42]
35María Naya-Plasencia[i7] [c20]
36Samuel Neves[i30]
37Ivica Nikolic[j27] [i29] [i24] [i23] [i22] [j25] [j23] [j22] [c76] [i18] [c73] [c68] [c62] [i7] [c20]
38Kazuo Ohta[c65] [c51] [j11] [c48] [c42] [c40] [c39] [c38] [c34] [c30] [i11] [j6] [j5] [c26] [j4] [j3] [c14] [j2] [c11] [c9] [c8] [j1] [c5] [c4] [i4] [i3] [c3] [c2] [i2] [i1] [c1]
39Chiaki Ohtahara[j9] [c36] [c27] [c25]
40Keita Okada[c36] [c27]
41Thomas Peyrin[i26] [c75] [c66] [i14] [c57] [i12] [c46] [j4]
42Kexin Qiao[j23] [i18]
43Shahram Rasoolzadeh[i30]
44Vincent Rijmen[i15] [c63]
45Günther Roland[c28]
46Yasuhide Sakai[c51] [c48]
47Hikaru Sakamoto[c56]
48Kazuo Sakiyama[b1] [c56] [c51] [j11] [c48] [c42] [c40] [c39] [c38] [c34] [c30] [i11] [j5] [c26] [c14]
49Pascal Sasdrich[i26] [c75]
50Martin Schläffer[c28] [i7] [c20]
51Takeshi Shimoyama[j9] [c36] [c27] [c25] [j4] [c9] [c5] [i4] [i3] [c3] [c2]
52Siang Meng Sim[i26] [i23] [j23] [c75] [i18]
53Marc Stevens[i30]
54Junko Takahashi[i11]
55Yasuhiro Takasaki[c39]
56Naoyuki Takayanagi[c30]
57Yosuke Todo[c80] [i25] [i21] [c77] [i15] [c63] [c53]
58Yuuki Tokushige[c65]
59Kerem Varici[i15] [c63]
60Gaoli Wang[j21]
61Lei Wang 0007[i13] [i12] [j11] [c49] [c48] [c47] [c46] [c44] [c40] [c39] [c38] [c37] [j8] [c34] [j6] [j5] [c26] [c24] [i6] [j3] [c19] [c14] [j2] [c11] [c8] [c4]
62Lei Wang 0031[j26] [j25] [j24] [i20] [i19] [j21] [j20] [c70] [i17] [i16] [j18] [j16] [c67] [c66] [c65] [c64] [c62] [c61] [c58] [c55] [c54] [c52] [c51]
63Meiqin Wang[i20] [c64]
64Qingju Wang[i15] [c63]
65Long Wen[i20] [c64]
66Shuang Wu[i19] [c58] [c47]
67Wenling Wu[c47]
68Jun Yajima[j4] [c9] [c5] [i4] [i3] [c3] [c2]
69Go Yamamoto[i5]
70Kan Yasuda[i31] [c72] [c71] [c54] [c32]

 

Last update 2017-06-25 23:41 CEST by the DBLP TeamThis material is Open Data Data released under the ODC-BY 1.0 license — See also our legal information page