Folgen
Yu Sasaki
Yu Sasaki
NTT Secure Platform Labratories
Keine bestätigte E-Mail-Adresse
Titel
Zitiert von
Zitiert von
Jahr
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Annual International Cryptology Conference, 123-153, 2016
5282016
GIFT: A Small Present
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
International conference on cryptographic hardware and embedded systems, 321-345, 2017
3612017
Finding preimages in full MD5 faster than exhaustive search
Y Sasaki, K Aoki
Annual International Conference on the Theory and Applications of …, 2009
2332009
Preimage attacks on one-block MD4, 63-step MD5 and more
K Aoki, Y Sasaki
International workshop on selected areas in cryptography, 103-119, 2008
1822008
New impossible differential search tool from design and cryptanalysis aspects
Y Sasaki, Y Todo
Annual International Conference on the Theory and Applications of …, 2017
1452017
Preimages for step-reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
International Conference on the Theory and Application of Cryptology and …, 2009
1382009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
K Aoki, Y Sasaki
Annual International Cryptology Conference, 70-89, 2009
1292009
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Annual International Conference on the Theory and Applications of …, 2018
1152018
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
International Conference on Cryptology in India, 143-160, 2014
1112014
MILP modeling for (large) s-boxes to optimize probability of differential characteristics
A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef
IACR Transactions on Symmetric Cryptology, 99-129, 2017
802017
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool
Y Sasaki
International Workshop on Fast Software Encryption, 378-396, 2011
782011
Quantum attacks without superposition queries: the offline Simon’s algorithm
X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ...
International Conference on the Theory and Application of Cryptology and …, 2019
702019
Nonlinear invariant attack
Y Todo, G Leander, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2016
682016
Meet-in-the-middle technique for integral attacks against feistel ciphers
Y Sasaki, L Wang
International Conference on Selected Areas in Cryptography, 234-251, 2012
682012
Rebound attack on the full LANE compression function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
682009
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
A Hosoyamada, Y Sasaki
International Conference on Security and Cryptography for Networks, 386-403, 2018
642018
Preimage attacks on 3, 4, and 5-pass HAVAL
Y Sasaki, K Aoki
International Conference on the theory and application of cryptology and …, 2008
622008
Improved collision attack on MD5
Y Sasaki, Y Naito, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2005
552005
Invariant subspace attack against Midori64 and the resistance criteria for S-box designs
J Guo, J Jean, I Nikolić, K Qiao, Y Sasaki, SM Sim
Cryptology ePrint Archive, 2016
522016
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
A Hosoyamada, Y Sasaki
Annual International Conference on the Theory and Applications of …, 2020
492020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20