| Piccolo: An Ultra-Lightweight Blockcipher K Shibutani, T Isobe, H Hiwatari, A Mitsuda, T Akishita, T Shirai International workshop on cryptographic hardware and embedded systems, 342-357, 2011 | 808 | 2011 |
| Midori: A block cipher for low energy S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ... International Conference on the Theory and Application of Cryptology and …, 2015 | 714 | 2015 |
| Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 174 | 2018 |
| A single-key attack on the full GOST block cipher T Isobe Journal of cryptology 26 (1), 172-189, 2013 | 169 | 2013 |
| White-box cryptography revisited: Space-hard ciphers A Bogdanov, T Isobe Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 131 | 2015 |
| Improved division property based cube attacks exploiting algebraic properties of superpoly Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang IEEE transactions on computers 68 (10), 1470-1486, 2019 | 117 | 2019 |
| Towards practical whitebox cryptography: optimizing efficiency and space hardness A Bogdanov, T Isobe, E Tischhauser International Conference on the Theory and Application of Cryptology and …, 2016 | 95 | 2016 |
| Security analysis of the lightweight block ciphers XTEA, LED and Piccolo T Isobe, K Shibutani Australasian Conference on Information Security and Privacy, 71-86, 2012 | 95 | 2012 |
| Fast correlation attack revisited: cryptanalysis on full grain-128a, grain-128, and grain-v1 Y Todo, T Isobe, W Meier, K Aoki, B Zhang Annual International Cryptology Conference, 129-159, 2018 | 81 | 2018 |
| Generic key recovery attack on Feistel scheme T Isobe, K Shibutani International Conference on the Theory and Application of Cryptology and …, 2013 | 77 | 2013 |
| WARP: Revisiting GFN for lightweight 128-bit block cipher S Banik, Z Bao, T Isobe, H Kubo, F Liu, K Minematsu, K Sakamoto, ... International Conference on Selected Areas in Cryptography, 535-564, 2020 | 76 | 2020 |
| Full plaintext recovery attack on broadcast RC4 T Isobe, T Ohigashi, Y Watanabe, M Morii International Workshop on Fast Software Encryption, 179-202, 2013 | 73 | 2013 |
| Analysis of software countermeasures for whitebox encryption S Banik, A Bogdanov, T Isobe, MB Jepsen Cryptology ePrint Archive, 2017 | 59 | 2017 |
| Preimage attacks on reduced Tiger and SHA-2 T Isobe, K Shibutani International Workshop on Fast Software Encryption, 139-155, 2009 | 57 | 2009 |
| Security analysis of end-to-end encryption for zoom meetings T Isobe, R Ito IEEE access 9, 90677-90689, 2021 | 56 | 2021 |
| All subkeys recovery attack on block ciphers: Extending meet-in-the-middle approach T Isobe, K Shibutani International Conference on Selected Areas in Cryptography, 202-221, 2012 | 56 | 2012 |
| Cryptanalysis of full LowMC and LowMC-M with algebraic techniques F Liu, T Isobe, W Meier Annual International Cryptology Conference, 368-401, 2021 | 54 | 2021 |
| Rocca: An efficient AES-based encryption scheme for beyond 5G K Sakamoto, F Liu, Y Nakano, S Kiyomoto, T Isobe IACR Transactions on Symmetric Cryptology, 1-30, 2021 | 50* | 2021 |
| Orthros: A low-latency PRF S Banik, T Isobe, F Liu, K Minematsu, K Sakamoto IACR Transactions on Symmetric Cryptology, 37-77, 2021 | 50 | 2021 |
| Automatic verification of differential characteristics: Application to reduced gimli F Liu, T Isobe, W Meier Annual International Cryptology Conference, 219-248, 2020 | 45* | 2020 |