


Остановите войну!
for scientists:


default search action
Yu Sasaki
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j50]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
MMM: Authenticated Encryption with Minimum Secret State for Masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 80-109 (2023) - 2022
- [c117]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
, Kan Yasuda:
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES. CCS 2022: 2323-2336 - [c116]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. CRYPTO (3) 2022: 315-345 - [c115]Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda:
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. IWSEC 2022: 107-127 - [i61]Nils Gregor Leander, Bart Mennink, María Naya-Plasencia, Yu Sasaki, Eran Lambooij:
Symmetric Cryptography (Dagstuhl Seminar 22141). Dagstuhl Reports 12(4): 1-12 (2022) - [i60]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking. IACR Cryptol. ePrint Arch. 2022: 812 (2022) - 2021
- [j49]Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida:
Update on Analysis of Lesamnta-LW and New PRF Mode LRF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1304-1320 (2021) - [j48]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 298-333 (2021) - [c114]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
Double-Block-Length Hash Function for Minimum Memory Size. ASIACRYPT (3) 2021: 376-406 - [c113]Raimu Isuzugawa
, Kodai Toyoda
, Yu Sasaki
, Daiki Miyahara
, Takaaki Mizuki
:
A Card-Minimal Three-Input AND Protocol Using Two Shuffles. COCOON 2021: 668-679 - [c112]Akinori Hosoyamada, Yu Sasaki:
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. CRYPTO (1) 2021: 616-646 - [c111]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. INDOCRYPT 2021: 114-137 - [c110]Yosuke Todo, Yu Sasaki:
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. SAC 2021: 179-199 - [i59]Akinori Hosoyamada, Yu Sasaki:
Quantum Collision Attacks on Reduced SHA-256 and SHA-512. IACR Cryptol. ePrint Arch. 2021: 292 (2021) - 2020
- [j47]Orr Dunkelman
, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. J. Cryptol. 33(3): 910-916 (2020) - [j46]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa
:
Quantum algorithm for the multicollision problem. Theor. Comput. Sci. 842: 100-117 (2020) - [j45]Gaëtan Leurent, Yu Sasaki:
Preface to Volume 2020, Issue 1. IACR Trans. Symmetric Cryptol. 2020(1): 1-5 (2020) - [j44]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang
:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2020(3): 152-174 (2020) - [j43]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security. IACR Trans. Symmetric Cryptol. 2020(4): 1-38 (2020) - [j42]Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki:
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers. IACR Trans. Symmetric Cryptol. 2020(4): 147-172 (2020) - [j41]Dahmun Goudarzi, Jérémy Jean, Stefan Kölbl, Thomas Peyrin, Matthieu Rivain, Yu Sasaki, Siang Meng Sim
:
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation. IACR Trans. Symmetric Cryptol. 2020(S1): 31-59 (2020) - [j40]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
SKINNY-AEAD and SKINNY-Hash. IACR Trans. Symmetric Cryptol. 2020(S1): 88-131 (2020) - [j39]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki:
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode. IACR Trans. Symmetric Cryptol. 2020(S1): 350-389 (2020) - [c109]Shoichi Hirose
, Yu Sasaki, Hirotaka Yoshida:
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode. ACNS (1) 2020: 89-109 - [c108]Tim Beyne
, Anne Canteaut, Itai Dinur, Maria Eichlseder
, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo
, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c107]Akinori Hosoyamada, Yu Sasaki:
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound. EUROCRYPT (2) 2020: 249-279 - [c106]Yusuke Naito, Yu Sasaki, Takeshi Sugawara
:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. EUROCRYPT (2) 2020: 705-735 - [c105]Yu Sasaki, Noriaki Kamiyama, Yusheng Ji:
Designing Content Placement of CDN for Improving Aggregation Effect of ICN FIBs. ICOIN 2020: 130-135 - [c104]Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition. IWSEC 2020: 3-22 - [i58]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm. CoRR abs/2002.12439 (2020) - [i57]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i56]Akinori Hosoyamada, Yu Sasaki:
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound. IACR Cryptol. ePrint Arch. 2020: 213 (2020) - [i55]Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation. IACR Cryptol. ePrint Arch. 2020: 542 (2020) - [i54]Sumanta Sarkar, Yu Sasaki, Siang Meng Sim:
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition. IACR Cryptol. ePrint Arch. 2020: 680 (2020) - [i53]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i52]Dhiman Saha, Yu Sasaki, Danping Shi, Ferdinand Sibleyras, Siwei Sun, Yingjie Zhang:
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2020: 1045 (2020) - [i51]Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki:
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers. IACR Cryptol. ePrint Arch. 2020: 1089 (2020)
2010 – 2019
- 2019
- [j38]Yu Sasaki, Kan Yasuda:
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 35-47 (2019) - [j37]Philipp Jovanovic, Atul Luykx, Bart Mennink, Yu Sasaki, Kan Yasuda:
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes. J. Cryptol. 32(3): 895-940 (2019) - [j36]Yosuke Todo
, Gregor Leander
, Yu Sasaki:
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32(4): 1383-1422 (2019) - [j35]Florian Mendel, Yu Sasaki:
Preface to Volume 2019, Issue 1. IACR Trans. Symmetric Cryptol. 2019(1): 1-4 (2019) - [j34]Zhenzhen Bao
, Jian Guo, San Ling
, Yu Sasaki:
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Trans. Symmetric Cryptol. 2019(1): 330-394 (2019) - [j33]Avik Chakraborti, Nilanjan Datta, Ashwin Jha
, Cuauhtemoc Mancillas-López, Mridul Nandi
, Yu Sasaki:
INT-RUP Secure Lightweight Parallel AE Modes. IACR Trans. Symmetric Cryptol. 2019(4): 81-118 (2019) - [c103]Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. ACISP 2019: 555-572 - [c102]Subhadeep Banik
, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. ACNS 2019: 43-63 - [c101]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm. ASIACRYPT (1) 2019: 552-583 - [c100]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li
, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS. CRYPTO (2) 2019: 180-209 - [c99]Tetsu Iwata, Virginie Lallemand, Gregor Leander
, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. CT-RSA 2019: 293-312 - [c98]Gembu Ito, Akinori Hosoyamada
, Ryutaroh Matsumoto
, Yu Sasaki, Tetsu Iwata
:
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers. CT-RSA 2019: 391-411 - [c97]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani
, Keita Xagawa
:
Improved Quantum Multicollision-Finding Algorithm. PQCrypto 2019: 350-367 - [i50]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Quantum Algorithm for the Multicollision Problem. CoRR abs/1911.02822 (2019) - [i49]Danping Shi, Siwei Sun, Yu Sasaki, Chaoyun Li, Lei Hu:
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS. IACR Cryptol. ePrint Arch. 2019: 172 (2019) - [i48]Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki:
SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes. IACR Cryptol. ePrint Arch. 2019: 209 (2019) - [i47]Subhadeep Banik, Jannis Bossert, Amit Jana, Eik List, Stefan Lucks, Willi Meier, Mostafizar Rahman, Dhiman Saha, Yu Sasaki:
Cryptanalysis of ForkAES. IACR Cryptol. ePrint Arch. 2019: 289 (2019) - [i46]Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki:
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. IACR Cryptol. ePrint Arch. 2019: 440 (2019) - [i45]Xavier Bonnetain, Akinori Hosoyamada, María Naya-Plasencia, Yu Sasaki, André Schrottenloher:
Quantum Attacks without Superposition Queries: the Offline Simon Algorithm. IACR Cryptol. ePrint Arch. 2019: 614 (2019) - [i44]Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. IACR Cryptol. ePrint Arch. 2019: 669 (2019) - [i43]Orr Dunkelman, Nathan Keller, Eran Lambooij, Yu Sasaki:
A Practical Forgery Attack on Lilliput-AE. IACR Cryptol. ePrint Arch. 2019: 867 (2019) - 2018
- [j32]Kota Kondo, Yu Sasaki, Yosuke Todo
, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 88-98 (2018) - [j31]Yu Sasaki, Yosuke Todo
:
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput. IEEE Trans. Computers 67(5): 717-732 (2018) - [c96]Yu Sasaki:
Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher. ACNS 2018: 421-439 - [c95]Yu Sasaki:
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC. AFRICACRYPT 2018: 87-106 - [c94]Tomer Ashur
, Maria Eichlseder
, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. ASIACRYPT (2) 2018: 35-64 - [c93]Akinori Hosoyamada
, Yu Sasaki:
Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations. CT-RSA 2018: 198-218 - [c92]Carlos Cid, Tao Huang, Thomas Peyrin
, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. EUROCRYPT (2) 2018: 683-714 - [c91]Yu Sasaki:
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT. IWSEC 2018: 227-243 - [c90]Yunwen Liu, Yu Sasaki, Ling Song, Gaoli Wang:
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes. SAC 2018: 92-114 - [c89]Akinori Hosoyamada
, Yu Sasaki:
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions. SCN 2018: 386-403 - [i42]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Improved Quantum Multicollision-Finding Algorithm. CoRR abs/1811.08097 (2018) - [i41]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Boomerang Connectivity Table: A New Cryptanalysis Tool. IACR Cryptol. ePrint Arch. 2018: 161 (2018) - [i40]Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier:
Cryptanalysis of MORUS. IACR Cryptol. ePrint Arch. 2018: 464 (2018) - [i39]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. IACR Cryptol. ePrint Arch. 2018: 793 (2018) - [i38]Akinori Hosoyamada, Yu Sasaki, Seiichiro Tani, Keita Xagawa:
Improved Quantum Multicollision-Finding Algorithm. IACR Cryptol. ePrint Arch. 2018: 1122 (2018) - [i37]Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers. IACR Cryptol. ePrint Arch. 2018: 1193 (2018) - 2017
- [j30]Anne Canteaut, Eran Lambooij, Samuel Neves
, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. IACR Trans. Symmetric Cryptol. 2017(2): 203-227 (2017) - [j29]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
:
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2017(3): 73-107 (2017) - [j28]Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. IACR Trans. Symmetric Cryptol. 2017(4): 99-129 (2017) - [c88]Akinori Hosoyamada
, Yu Sasaki, Keita Xagawa
:
Quantum Multicollision-Finding Algorithm. ASIACRYPT (2) 2017: 179-210 - [c87]Subhadeep Banik
, Sumit Kumar Pandey, Thomas Peyrin
, Yu Sasaki, Siang Meng Sim
, Yosuke Todo
:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [c86]Yu Sasaki, Yosuke Todo
:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers. EUROCRYPT (3) 2017: 185-215 - [c85]Yu Sasaki, Kan Yasuda:
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. ISPEC 2017: 217-236 - [c84]Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Rate-One AE with Security Under RUP. ISC 2017: 3-20 - [c83]Kota Kondo, Yu Sasaki, Yosuke Todo
, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. IWSEC 2017: 141-158 - [c82]Yu Sasaki, Yosuke Todo
:
New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search. SECITC 2017: 150-165 - [i36]Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Message-Recovery MACs and Verification-Unskippable AE. IACR Cryptol. ePrint Arch. 2017: 260 (2017) - [i35]Anne Canteaut, Eran Lambooij, Samuel Neves, Shahram Rasoolzadeh, Yu Sasaki, Marc Stevens:
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. IACR Cryptol. ePrint Arch. 2017: 478 (2017) - [i34]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - [i33]Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song:
Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 693 (2017) - [i32]Akinori Hosoyamada, Yu Sasaki, Keita Xagawa:
Quantum Multicollision-Finding Algorithm. IACR Cryptol. ePrint Arch. 2017: 864 (2017) - [i31]Akinori Hosoyamada, Yu Sasaki:
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations. IACR Cryptol. ePrint Arch. 2017: 977 (2017) - [i30]Akinori Hosoyamada, Yu Sasaki:
Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions. IACR Cryptol. ePrint Arch. 2017: 1229 (2017) - 2016
- [j27]Jian Guo
, Jérémy Jean, Ivica Nikolic
, Yu Sasaki:
Extended meet-in-the-middle attacks on some Feistel constructions. Des. Codes Cryptogr. 80(3): 587-618 (2016) - [j26]Yu Sasaki, Lei Wang:
Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 22-30 (2016) - [j25]Jérémy Jean, Ivica Nikolic, Yu Sasaki, Lei Wang:
Practical Forgeries and Distinguishers against PAES. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 39-48 (2016) - [j24]Yu Sasaki, Lei Wang:
Message Extension Attack against Authenticated Encryptions: Application to PANDA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 49-57 (2016) - [j23]Jian Guo
, Jérémy Jean, Ivica Nikolic
, Kexin Qiao, Yu Sasaki, Siang Meng Sim
:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Trans. Symmetric Cryptol. 2016(1): 33-56 (2016) - [j22]Jian Guo
, Jérémy Jean, Ivica Nikolic
, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Trans. Symmetric Cryptol. 2016(2): 307-337 (2016) - [c81]Nasour Bagheri
, Florian Mendel, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. ACISP (2) 2016: 301-316 - [c80]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. ACNS 2016: 518-536 - [c79]Yosuke Todo
, Gregor Leander
, Yu Sasaki:
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33 - [c78]Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. ASIACRYPT (1) 2016: 627-647 - [c77]Christof Beierle
, Jérémy Jean, Stefan Kölbl, Gregor Leander
, Amir Moradi
, Thomas Peyrin
, Yu Sasaki, Pascal Sasdrich
, Siang Meng Sim
:
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. CRYPTO (2) 2016: 123-153 - [c76]Nasour Bagheri
, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. FSE 2016: 554-574 - [c75]Yu Sasaki, Yosuke Todo
:
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. SAC 2016: 264-283 - [i29]Ivica Nikolic, Yu Sasaki:
Refinements of the k-tree Algorithm for the Generalized Birthday Problem. IACR Cryptol. ePrint Arch. 2016: 312 (2016) - [i28]Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:
Cryptanalysis of Reduced NORX. IACR Cryptol. ePrint Arch. 2016: 436 (2016) - [i27]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IACR Cryptol. ePrint Arch. 2016: 625 (2016) - [i26]Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. IACR Cryptol. ePrint Arch. 2016: 660 (2016) - [i25]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptol. ePrint Arch. 2016: 732 (2016) - [i24]Ivica Nikolic, Yu Sasaki:
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem. IACR Cryptol. ePrint Arch. 2016: 851 (2016) - [i23]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki, Siang Meng Sim:
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs. IACR Cryptol. ePrint Arch. 2016: 973 (2016) - [i22]Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions. IACR Cryptol. ePrint Arch. 2016: 1162 (2016) - [i21]Yu Sasaki, Yosuke Todo:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. IACR Cryptol. ePrint Arch. 2016: 1181 (2016) - 2015
- [b1]Kazuo Sakiyama, Yu Sasaki, Yang Li:
Security of Block Ciphers - From Algorithm Design to Hardware Implementation. Wiley 2015, ISBN 978-1-118-66001-0, pp. I-XII, 1-295 - [j21]Yu Sasaki, Gaoli Wang, Lei Wang:
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 26-38 (2015) - [j20]Yu Sasaki, Lei Wang:
Bitwise Partial-Sum: A New Tool for Integral Analysis against ARX Designs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 49-60 (2015) - [j19]Yu Sasaki:
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 61-71 (2015) - [c74]