| Blockcipher-based MACs: beyond the birthday bound without message length Y Naito International Conference on the Theory and Application of Cryptology and …, 2017 | 58 | 2017 |
| Improved collision attack on MD5 Y Sasaki, Y Naito, N Kunihiro, K Ohta Cryptology ePrint Archive, 2005 | 55 | 2005 |
| SAEB: A lightweight blockcipher-based AEAD mode of operation Y Naito, M Matsui, T Sugawara, D Suzuki Cryptology ePrint Archive, 2019 | 51 | 2019 |
| Full PRF-secure message authentication code based on tweakable block cipher Y Naito International Conference on Provable Security, 167-182, 2015 | 50 | 2015 |
| Improved collision attack on MD4 with probability almost 1 Y Naito, Y Sasaki, N Kunihiro, K Ohta International Conference on Information Security and Cryptology, 129-145, 2005 | 46 | 2005 |
| Minalpher v1 Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ... CAESAR Round 1, 2014 | 44 | 2014 |
| Lightweight authenticated encryption mode suitable for threshold implementation Y Naito, Y Sasaki, T Sugawara Annual International Conference on the Theory and Applications of …, 2020 | 40 | 2020 |
| Lightweight authenticated encryption mode of operation for tweakable block ciphers Y Naito, T Sugawara IACR Transactions on Cryptographic Hardware and Embedded Systems, 66-94, 2020 | 32 | 2020 |
| Tweakable blockciphers for efficient authenticated encryptions with beyond the birthday-bound security Y Naito Cryptology ePrint Archive, 2017 | 32 | 2017 |
| Improved collision search for SHA-0 Y Naito, Y Sasaki, T Shimoyama, J Yajima, N Kunihiro, K Ohta International Conference on the Theory and Application of Cryptology and …, 2006 | 29 | 2006 |
| Generic state-recovery and forgery attacks on ChopMD-MAC and on NMAC/HMAC Y Naito, Y Sasaki, L Wang, K Yasuda International Workshop on Security, 83-98, 2013 | 25 | 2013 |
| How to construct sufficient condition in searching collisions of MD5 Y Sasaki, Y Naito, J Yajima, T Shimoyama, N Kunihiro, K Ohta Cryptology ePrint Archive, 2006 | 25 | 2006 |
| New bounds for keyed sponges with extendable output: Independence between capacity and message length Y Naito, K Yasuda International Conference on Fast Software Encryption, 3-22, 2016 | 23 | 2016 |
| Improved collision attacks on MD4 and MD5 Y Sasaki, Y Naito, N Kunihiro, K Ohta IEICE transactions on fundamentals of electronics, communications and …, 2007 | 22 | 2007 |
| A new strategy for finding a differential path of SHA-1 J Yajima, Y Sasaki, Y Naito, T Iwasaki, T Shimoyama, N Kunihiro, K Ohta Australasian Conference on Information Security and Privacy, 45-58, 2007 | 21 | 2007 |
| Secret can be public: low-memory AEAD mode for high-order masking Y Naito, Y Sasaki, T Sugawara Annual International Cryptology Conference, 315-345, 2022 | 19 | 2022 |
| Key committing security of AEZ and more YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ... IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023 | 17 | 2023 |
| Optimally indifferentiable double-block-length hashing without post-processing and with support for longer key than single block Y Naito International Conference on Cryptology and Information Security in Latin …, 2019 | 17 | 2019 |
| Committing security of ascon: Cryptanalysis on primitive and proof on mode Y Naito, Y Sasaki, T Sugawara IACR Transactions on Symmetric Cryptology 2023 (4), 420-451, 2023 | 16 | 2023 |
| Improved Indifferentiable Security Analysis of PHOTON Y Naito, K Ohta International Conference on Security and Cryptography for Networks, 340-357, 2014 | 16 | 2014 |