| The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ... Annual international cryptology conference, 123-153, 2016 | 997 | 2016 |
| GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo International conference on cryptographic hardware and embedded systems, 321-345, 2017 | 722 | 2017 |
| Finding preimages in full MD5 faster than exhaustive search Y Sasaki, K Aoki Annual International Conference on the Theory and Applications of …, 2009 | 280 | 2009 |
| Boomerang connectivity table: A new cryptanalysis tool C Cid, T Huang, T Peyrin, Y Sasaki, L Song Annual international conference on the theory and applications of …, 2018 | 273 | 2018 |
| New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers Y Sasaki, Y Todo Annual international conference on the theory and applications of …, 2017 | 253 | 2017 |
| Preimage attacks on one-block MD4, 63-step MD5 and more K Aoki, Y Sasaki International workshop on selected areas in cryptography, 103-119, 2008 | 223 | 2008 |
| Quantum attacks without superposition queries: the offline Simon’s algorithm X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ... International conference on the theory and application of cryptology and …, 2019 | 179 | 2019 |
| Preimages for step-reduced SHA-2 K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang International Conference on the Theory and Application of Cryptology and …, 2009 | 161 | 2009 |
| MILP modeling for (large) s-boxes to optimize probability of differential characteristics A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef IACR Transactions on Symmetric Cryptology, 99-129, 2017 | 158 | 2017 |
| Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1 K Aoki, Y Sasaki Annual International Cryptology Conference, 70-89, 2009 | 155 | 2009 |
| Nonlinear invariant attack: Practical attack on full scream, i scream, and midori 64 Y Todo, G Leander, Y Sasaki Journal of Cryptology 32 (4), 1383-1422, 2019 | 148 | 2019 |
| Cryptanalysis of reduced-round SIMON32 and SIMON48 Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo International Conference on Cryptology in India, 143-160, 2014 | 136 | 2014 |
| Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions A Hosoyamada, Y Sasaki International conference on security and cryptography for networks, 386-403, 2018 | 125 | 2018 |
| Gift-cofb S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ... Cryptology ePrint Archive, 2020 | 118 | 2020 |
| Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool Y Sasaki IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 116 | 2013 |
| Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound A Hosoyamada, Y Sasaki Annual International Conference on the Theory and Applications of …, 2020 | 110 | 2020 |
| Quantum chosen-ciphertext attacks against Feistel ciphers G Ito, A Hosoyamada, R Matsumoto, Y Sasaki, T Iwata Cryptographers’ Track at the RSA Conference, 391-411, 2019 | 110 | 2019 |
| New algorithm for modeling S-box in MILP based differential and division trail search Y Sasaki, Y Todo International Conference for Information Technology and Communications, 150-165, 2017 | 101 | 2017 |
| Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... Annual International Cryptology Conference, 299-328, 2020 | 100 | 2020 |
| Invariant subspace attack against Midori64 and the resistance criteria for S-box designs J Guo, J Jean, I Nikolic, K Qiao, Y Sasaki, SM Sim IACR Transactions on Symmetric Cryptology, 33-56, 2016 | 88 | 2016 |