[go: up one dir, main page]

Follow
Yu Sasaki
Yu Sasaki
NTT Social Informatics Labratories
Verified email at ntt.com
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Annual international cryptology conference, 123-153, 2016
9972016
GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
International conference on cryptographic hardware and embedded systems, 321-345, 2017
7222017
Finding preimages in full MD5 faster than exhaustive search
Y Sasaki, K Aoki
Annual International Conference on the Theory and Applications of …, 2009
2802009
Boomerang connectivity table: A new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Annual international conference on the theory and applications of …, 2018
2732018
New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers
Y Sasaki, Y Todo
Annual international conference on the theory and applications of …, 2017
2532017
Preimage attacks on one-block MD4, 63-step MD5 and more
K Aoki, Y Sasaki
International workshop on selected areas in cryptography, 103-119, 2008
2232008
Quantum attacks without superposition queries: the offline Simon’s algorithm
X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ...
International conference on the theory and application of cryptology and …, 2019
1792019
Preimages for step-reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
International Conference on the Theory and Application of Cryptology and …, 2009
1612009
MILP modeling for (large) s-boxes to optimize probability of differential characteristics
A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef
IACR Transactions on Symmetric Cryptology, 99-129, 2017
1582017
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
K Aoki, Y Sasaki
Annual International Cryptology Conference, 70-89, 2009
1552009
Nonlinear invariant attack: Practical attack on full scream, i scream, and midori 64
Y Todo, G Leander, Y Sasaki
Journal of Cryptology 32 (4), 1383-1422, 2019
1482019
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
International Conference on Cryptology in India, 143-160, 2014
1362014
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
A Hosoyamada, Y Sasaki
International conference on security and cryptography for networks, 386-403, 2018
1252018
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
1182020
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool
Y Sasaki
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
1162013
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
A Hosoyamada, Y Sasaki
Annual International Conference on the Theory and Applications of …, 2020
1102020
Quantum chosen-ciphertext attacks against Feistel ciphers
G Ito, A Hosoyamada, R Matsumoto, Y Sasaki, T Iwata
Cryptographers’ Track at the RSA Conference, 391-411, 2019
1102019
New algorithm for modeling S-box in MILP based differential and division trail search
Y Sasaki, Y Todo
International Conference for Information Technology and Communications, 150-165, 2017
1012017
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
Annual International Cryptology Conference, 299-328, 2020
1002020
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolic, K Qiao, Y Sasaki, SM Sim
IACR Transactions on Symmetric Cryptology, 33-56, 2016
882016
The system can't perform the operation now. Try again later.
Articles 1–20